IJCNIS Vol. 5, No. 1, 8 Jan. 2013
Cover page and Table of Contents: PDF (size: 1208KB)
Full Text (PDF, 1208KB), PP.1-13
Views: 0 Downloads: 0
Biased byte attack, exponential brute force, network security permutation vector generation, stream cipher
This paper introduces a permutation generation mechanism based on a shared secret key. The generated permutation vectors are used as encryption keys in a stream ciphering cryptosystem. We investigated various types of attacks on the known stream cipher RC4 and patched most of its loopholes, especially biased-byte and state-related attacks. Unique to our approach, we prove mathematically that the complexity of brute-forcing such a system is (2n), where n is the key size in bytes. This paper also presents a complete security model using permutation-based encryption, in order to handle privacy. In addition, our approach achieved higher performance than that of existing peer techniques, while maintaining solid security. Experimental results show that our system is much faster than the existing security mechanisms, such as AES and DES.
Mohammed Omari, Hamdy S. Soliman, "Exponential Brute-Force Complexity of A Permutation Based Stream Cipher", International Journal of Computer Network and Information Security(IJCNIS), vol.5, no.1, pp.1-13,2013. DOI:10.5815/ijcnis.2013.01.01
[1]D. Knuth, "The Art of Computer Programming, Volume 4: Generating All Tuples and Permutations," Addison-Wesley, 2005.
[2]A. Nijenhuis and H. Wilf, "Combinatorial Algorithms for Computers and Calculators," Academic Press, Orlando FL, second edition, 1978.
[3]S. Skiena, "Implementing Discrete Mathematics," Addison-Wesley, Redwood City, CA, 1990.
[4]D. Stinson. "Cryptography: Theory and Practice." Boca Raton, CRC Press, LLC, 1995.
[5]National Bureau of Standards. "Data Encryption Standard." NBS FIPS Publication 46, Jan. 1977.
[6]B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, and N. Ferguson, "The Twofish Encryption Algorithm: A 128-Bit Block Cipher," John Wiley and Sons, 1999.
[7]E. Biham, R. Anderson and L. Knudsen, "Serpent: A New Block Cipher Proposal," Proc. 5th International Workshop on Fast Software Encryption, Paris, France, Mar 1998, pp. 222-238.
[8]J. P. McGregor and R. B. Lee. "Architectural Enhancements for Fast Subword Permutations with Repetitions in Cryptographic Applications," The International Conference on Computer Design: VLSI in Computers and Processors, 2001.
[9]R. Wash, "Lecture Notes on Stream Ciphers and RC4," working paper, Sep. 2001.
[10]B. Schneier. "Applied Cryptography," John Wiley and Sons, Second Edition, 1996, pp 397-400.
[11]A. Menezes, P. Van Oorschot and S. Vanstone, "Handbook of Applied Cryptography," CRC Press, Inc., 1997.
[12]S Fluhrer, I. Mantin, and A. Shamir. "Weaknesses in the Key Scheduling Algorithm of RC4," Selected Areas in Cryptography, 8th Annual International Workshop, SAC 2001 Toronto, Ontario, Canada, Aug. 2001.
[13]G. Gong, K. C. Gupta, M. Hell, and Y. Nawaz, "Towards a General RC4-Like Keystream Generator," Proc. 1st SKLOIS conference on Information Security and Cryptology, Beijing, China, Dec. 2005, pp 162-174.
[14]S. Fluhrer and D. McGrew, "Statistical Analysis of the Alleged RC4 Key Stream Generator," Proc. 7th International Workshop on Fast Software Encryption, New York, NY, USA, Apr. 2000, pp 19-30.
[15]I. Mantin and A. Shamir, "A Practical Attack on Broadcast RC4," Proc. 8th International Workshop on Fast Software Encryption, Yokohama, Japan, Apr. 2001, pp 152-164.
[16]H. S. Soliman and M. Omari, "New Design Strategy of Dynamic Security Implementation," IEEE Globecom 2004 Workshop on Adaptive Wireless Networks, Dallas, TX, Dec. 2004.
[17]H. S. Soliman and M. Omari, "An Efficient Application of a Dynamic Crypto System in Mobile Wireless Security," IEEE Wireless Communications and Networking Conference, Atlanta, Georgia, Mar. 2004.
[18]H. S. Soliman and M. Omari, "Application of Synchronous Dynamic Encryption System (SDES) in Wireless Sensor Networks," International Journal of Network Security, vol 3, no. 2, 2006, pp 160-171.