A New Adaptive Security Architecture with Extensible Computation Complexity for Generic Ciphers

被引:0
|
作者
Prathap Siddavaatam
Reza Sedaghat
机构
[1] Ryerson University,OPRA
关键词
Algebraic cryptanalysis; Addition modulo; Algebraic degree; Scalability; SNOW2.0; TRIVIUM; S-box; IDEA; AES; LFSR; NFSR; SAT solver; Stream cipher; Block cipher;
D O I
10.1007/s41635-019-00073-x
中图分类号
学科分类号
摘要
Among recent developments on ciphers, attacks involving polynomial cryptanalysis have gained prominent attention in evaluating encryption algorithms for both stream and block ciphers. Algebraic cryptanalysis is also a tool to measure the strength of a cipher in terms of its resistance against different types of polynomial attacks. A contemporary way of representing such ciphers is in terms of multivariate equations over 𝔾𝔽(2)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$\mathbb {GF}(2)$\end{document}, which are highly vulnerable to algebraic cryptanalysis. Algebraic cryptanalysis, in its general form, aims to recover the internal secret state bits of the registers of the cipher by solving non-linear algebraic equations. Recent trends in algebraic cryptanalysis tend to use modular addition 2n over logic XOR as a mixing operator to guard against such malicious attacks. Nonetheless, it has been observed that the complexity of modular addition can be drastically decreased with the appropriate formulation of polynomial equations and probabilistic conditions. This article outlines a new design framework for modular addition with added security enhancements to address these issues. Inspiring from this framework, we show that the new design is characterized by user-specified extendable security for stronger encryption and does not impose changes in existing layout of ciphers including stream ciphers such as SNOW2.0, BIVIUM, and grain family, and block ciphers like IDEA, SAFER, AES, and DES. Our proposed design framework can be rapidly scaled to use-specific requirements which boosts the algebraic degree of the overall structure. This, in turn, thwarts the probabilistic conditions by retaining the original hardware complexity sans critical modifications of modular addition 2n.
引用
收藏
页码:319 / 337
页数:18
相关论文
共 50 条
  • [21] AN ADAPTIVE SECURITY ARCHITECTURE FOR FUTURE AIRCRAFT COMMUNICATIONS
    Ben Mahmoud, Mohamed Slim
    Larrieu, Nicolas
    Pirovano, Alain
    Varet, Antoine
    29TH DIGITAL AVIONICS SYSTEMS CONFERENCE: IMPROVING OUR ENVIRONMENT THROUGH GREEN AVIONICS AND ATM SOLUTIONS, 2010,
  • [22] A New Security Architecture for BitTorrent
    Bader, Firas
    Radoveneanu, Andra
    Ragab-Hassen, Hani
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 451 - 455
  • [23] Elements of a new security architecture
    Muenkler, Herfried
    INTERNATIONALE POLITIK, 2007, 62 (05): : 6 - 14
  • [24] The new Java security architecture
    Department of Computer Science and Software Engineering, Auburn University
    不详
    不详
    CrossTalk, 2006, 7
  • [25] A New Bluetooth Security Architecture
    Philip, Mintu
    Das, Asha
    TRENDS IN COMPUTER SCIENCE, ENGINEERING AND INFORMATION TECHNOLOGY, 2011, 204 : 507 - 515
  • [26] A New Adaptable Construction of Modulo Addition with Scalable Security for Stream Ciphers
    Cheng, Min Hsuan
    Sedaghat, Reza
    Siddavaatam, Prathap
    NETWORK AND SYSTEM SECURITY, (NSS 2016), 2016, 9955 : 383 - 397
  • [27] Security Amplification for the Composition of Block Ciphers: Simpler Proofs and New Results
    Cogliati, Benoit
    Patarin, Jacques
    Seurin, Yannick
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2014, 2014, 8781 : 129 - 146
  • [28] Information security architecture synthesis in distributed information computation systems
    Grusho A.A.
    Grusho N.A.
    Timonina E.E.
    Automatic Control and Computer Sciences, 2017, 51 (8) : 799 - 804
  • [29] On the Security of Optical Ciphers Under the Architecture of Compressed Sensing Combining With Double Random Phase Encoding
    Chen, Junxin
    Zhang, Yushu
    Zhang, Leo Yu
    IEEE PHOTONICS JOURNAL, 2017, 9 (04):
  • [30] Web Based IOPT Petri Net Editor with an Extensible Plugin Architecture to Support Generic Net Operations
    Pereira, Fernando
    Moutinho, Filipe
    Ribeiro, Jose
    Gomes, Luis
    38TH ANNUAL CONFERENCE ON IEEE INDUSTRIAL ELECTRONICS SOCIETY (IECON 2012), 2012, : 6151 - 6156