...
首页> 外文期刊>Journal of computer sciences >Message Based Random Variable Length Key Encryption Algorithm
【24h】

Message Based Random Variable Length Key Encryption Algorithm

机译:基于消息的随机可变长度密钥加密算法

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Problem statement: A block ciphers provides confidentiality in cryptography but cryptanalysis of the classical block ciphers demonstrated some old weaknesses grabbing a partial key in any stage of encryption procedure leads to reconstructing the whole key. Exhaustive key search shows that key generation should be indeterminist and random for each round. Matching cipher-text attack shows that larger size of block is more secure. In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. Approach: Dynamic and message dependent key generator was created by producing a random number and it was selected as the size of first chunk. Residual value of second chunk divided by first chunk concatenating with first chunk forms the first cipher as an input for SP-boxes. These processes repeated until whole mesaage get involved into the last cipher. Encrypted messages are not equal under different run. Value of random number should be greater than 35 bits and plaintext must be at least 7 bits. A padding algorithm was used for small size messages or big random numbers. Results: Attack on the key generation process was prevented because of random key generation and its dependency to input message. Encryption and decryption times measured between 5 and 27 m sec in 2 GHz Pentium and Java platform so time variant and fast enough key generation had been kept collision and timing attacks away due to small seized storage. Long and variable key length made key exhaustive search and differential attack impossible. None fixed size key caused avoidance of replaying and other attacks that can happen on fixed sized key algorithms. Conclusion: Random process employed in this block cipher increased confidentiality of the message and dynamic length substitution in proposed algorithm may lead to maximum cryptographic confusion and consequently makes it difficult for cryptanalysis.
机译:问题陈述:分组密码提供了密码学的机密性,但是对经典分组密码的加密分析表明,在加密过程的任何阶段都抓住了部分密钥的某些旧弱点导致了重建整个密钥。详尽的密钥搜索表明,密钥生成应该是不确定的,并且每一轮都是随机的。匹配的密文攻击表明,更大的块更安全。为了克服上面提到的分析,设计了一种新算法,该算法基于随机数并且还可以克服时间和内存限制。方法:通过产生一个随机数来创建动态和与消息相关的密钥生成器,并将其选作第一个块的大小。第二块的残值除以与第一块连接的第一块,形成第一密码作为SP盒的输入。重复这些过程,直到整个消息进入最后一个密码为止。在不同的运行下,加密的消息不相等。随机数的值应大于35位,明文至少应为7位。填充算法用于小尺寸消息或大随机数。结果:由于随机密钥生成及其对输入消息的依赖性,防止了对密钥生成过程的攻击。在2 GHz Pentium和Java平台上,加密和解密时间介于5到27毫秒之间,因此由于占用的存储空间小,因此时变和足够快的密钥生成得以避免冲突和定时攻击。较长且可变的密钥长度使密钥穷举搜索和差分攻击变得不可能。固定大小的密钥不会导致避免重播以及固定大小的密钥算法可能发生的其他攻击。结论:在该分组密码中采用的随机过程提高了消息的机密性,并且所提出算法中的动态长度替换可能导致最大的密码混乱,因此使密码分析变得困难。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号