Key Expansion in Cryptographic Systems

被引:0
|
作者
Chitu, Sorin [1 ]
Vasile, Daniel Ciprian [1 ]
Tramandan, Ionut Daniel [1 ]
Svasta, Paul [1 ]
机构
[1] Univ Politehn Bucuresti, UPB CETTI, Bucharest, Romania
基金
欧盟地平线“2020”;
关键词
key; cryptography; pseudorandom; permutation; algorithm;
D O I
10.1109/siitme50350.2020.9292242
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The manner in which a secret key is used in symmetric cryptographic systems is a permanent challenge for cryptographers due to its importance in overall security required for information protection. In order to mitigate the success rate of an attacker, a key expansion stage is included in cryptographic algorithms. This article presents an innovative solution that maximizes the key space, without reveal any information to an attacker who might monitor the communication channel. The prerequisites of this approach are the secret keys, a pseudorandom numbers generator and a random number generator, all of these being aggregate by a challenge-response mutual authentication protocol and a permutation function. For an efficient implementation, the already existing conductive mesh and the associated electronic circuits, dedicated to protect the cryptographic module against physical intrusion attempts of an attacker, are used to generate random numbers, without being necessary other electronic circuits. The numbers established as a result of the mutual authentication protocol will be used further to permute the secret key so, after each logical (re)synchronization, different keys will be used in cipher algorithm. Due to this key space extension process, the confusion and diffusion properties belonging to cypher algorithm are improved.
引用
收藏
页码:202 / 205
页数:4
相关论文
共 50 条
  • [1] A FRAMEWORK FOR SECURE CRYPTOGRAPHIC KEY MANAGEMENT SYSTEMS
    Varalakshmi, P.
    Shajina, A. R.
    Kanimozhi, T.
    [J]. 2014 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, 2014, : 319 - 323
  • [2] ID-BASED PUBLIC KEY CRYPTOGRAPHIC SYSTEMS
    Cheremushkin, A. V.
    [J]. PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2023, (61): : 44 - 85
  • [3] Cryptographic Key Management for SCADA Systems, Issues and Perspectives
    Pietre-Cambacedes, Ludovic
    Sitbon, Pascal
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2008, 2 (03): : 31 - 40
  • [4] Cryptographic key management for SCADA systems -: issues and perspectives
    Pietre-Cambacedes, Ludovic
    Sitbon, Pascal
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 156 - 161
  • [5] LIFETIMES OF KEYS IN CRYPTOGRAPHIC KEY MANAGEMENT-SYSTEMS
    OKAMOTO, E
    NAKAMURA, K
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 : 246 - 259
  • [6] On replacing cryptographic keys in hierarchical key management systems
    Kayem, Anne
    Akl, Selim
    Martin, Patrick
    [J]. JOURNAL OF COMPUTER SECURITY, 2008, 16 (03) : 289 - 309
  • [7] The Cryptographic Key Distribution System for IoT Systems in the MQTT Environment
    Furtak, Janusz
    [J]. SENSORS, 2023, 23 (11)
  • [8] An Evaluation on Securing Cloud Systems based on Cryptographic Key Algorithms
    Njuki, Sam
    Zhang, Jianbiao
    Too, Edna C.
    Richard, Rimiru
    [J]. PROCEEDINGS OF THE 2018 2ND INTERNATIONAL CONFERENCE ON ALGORITHMS, COMPUTING AND SYSTEMS (ICACS 2018), 2018, : 14 - 20
  • [9] Modern techniques for decentralized key establishment in symmetric cryptographic systems
    Galis, Meiran
    Unkasevic, Tomislav
    Milosavljevic, Milan
    Banjac, Zoran
    Milosav, Predrag
    [J]. 2021 29TH TELECOMMUNICATIONS FORUM (TELFOR), 2021,
  • [10] Performance Analysis of Public key Cryptographic Systems RSA and NTRU
    Challa, Narasimham
    Pradhan, Jayaram
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (08): : 87 - 96