A New Adaptive Security Architecture with Extensible Computation Complexity for Generic Ciphers

被引:0
|
作者
Prathap Siddavaatam
Reza Sedaghat
机构
[1] Ryerson University,OPRA
关键词
Algebraic cryptanalysis; Addition modulo; Algebraic degree; Scalability; SNOW2.0; TRIVIUM; S-box; IDEA; AES; LFSR; NFSR; SAT solver; Stream cipher; Block cipher;
D O I
10.1007/s41635-019-00073-x
中图分类号
学科分类号
摘要
Among recent developments on ciphers, attacks involving polynomial cryptanalysis have gained prominent attention in evaluating encryption algorithms for both stream and block ciphers. Algebraic cryptanalysis is also a tool to measure the strength of a cipher in terms of its resistance against different types of polynomial attacks. A contemporary way of representing such ciphers is in terms of multivariate equations over 𝔾𝔽(2)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$\mathbb {GF}(2)$\end{document}, which are highly vulnerable to algebraic cryptanalysis. Algebraic cryptanalysis, in its general form, aims to recover the internal secret state bits of the registers of the cipher by solving non-linear algebraic equations. Recent trends in algebraic cryptanalysis tend to use modular addition 2n over logic XOR as a mixing operator to guard against such malicious attacks. Nonetheless, it has been observed that the complexity of modular addition can be drastically decreased with the appropriate formulation of polynomial equations and probabilistic conditions. This article outlines a new design framework for modular addition with added security enhancements to address these issues. Inspiring from this framework, we show that the new design is characterized by user-specified extendable security for stronger encryption and does not impose changes in existing layout of ciphers including stream ciphers such as SNOW2.0, BIVIUM, and grain family, and block ciphers like IDEA, SAFER, AES, and DES. Our proposed design framework can be rapidly scaled to use-specific requirements which boosts the algebraic degree of the overall structure. This, in turn, thwarts the probabilistic conditions by retaining the original hardware complexity sans critical modifications of modular addition 2n.
引用
收藏
页码:319 / 337
页数:18
相关论文
共 50 条
  • [31] Generic System for Remote Testing and Calibration of Measuring Instruments: Security Architecture
    Jurcevic, M.
    Hegedus, H.
    Golub, M.
    MEASUREMENT SCIENCE REVIEW, 2010, 10 (02): : 50 - 55
  • [32] Technological complexity and the new architecture of competition
    Norman, PM
    Bettis, RA
    STRATEGIC DISCOVERY: COMPETING IN NEW ARENAS, 1997, : 5 - 22
  • [33] A Generic Information-Centric Architecture for Robotic Systems Derived from a New Theory for Adaptive Systems
    Coman, Vasile
    Chervenic, Michael
    Moldovan, Radu
    2009 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR PRACTICAL ROBOT APPLICATIONS (TEPRA 2009), 2009, : 88 - +
  • [34] Complexity and Simplicity Tensions in teaching computation to large numbers of architecture students
    Spaeth, A. Benjamin
    Dounas, Theodoros
    Kieferle, Joachim
    ECAADE 2016: COMPLEXITY & SIMPLICITY, VOL 1, 2016, : 229 - 236
  • [35] ARCHITECTURE FOR VARIABLE BITRATE NEURAL SPEECH CODEC WITH CONFIGURABLE COMPUTATION COMPLEXITY
    Jayashankar, Tejas
    Koehler, Thilo
    Kalgaonkar, Kaustubh
    Xiu, Zhiping
    Wu, Jilong
    Lin, Ju
    Agrawal, Prabhav
    He, Qing
    2022 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2022, : 861 - 865
  • [36] SPECSA: a scalable, policy-driven, extensible, and custornizable security architecture for wireless enterprise applications
    Itani, W
    Kayssi, A
    COMPUTER COMMUNICATIONS, 2004, 27 (18) : 1825 - 1839
  • [37] Specsa: A scalable, policy-driven, extensible, and customizable security architecture for wireless enterprise applications
    Itani, Wassim
    Kayssi, Ayman
    Comput Commun, 1600, 18 SPEC. ISS. (1825-1839):
  • [38] SPECSA: a scalable, policy-driven, extensible, and customizable security architecture for wireless enterprise applications
    Itani, W
    Kayssi, AI
    CONFERENCE PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2004, : 753 - 759
  • [39] Architecture and fuzzy adaptive security algorithm in intelligent firewall
    Zou, J
    Lu, KN
    Jin, ZG
    2002 MILCOM PROCEEDINGS, VOLS 1 AND 2: GLOBAL INFORMATION GRID - ENABLING TRANSFORMATION THROUGH 21ST CENTURY COMMUNICATIONS, 2002, : 1145 - 1149
  • [40] Semi-adaptive Security and Bundling Functionalities Made Generic and Easy
    Goyal, Rishab
    Koppula, Venkata
    Waters, Brent
    THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II, 2016, 9986 : 361 - 388