Part of the book series:Lecture Notes in Computer Science ((LNISA,volume 8708))
Included in the following conference series:
1229Accesses
Abstract
In recent years, parallel computing capabilities have been more powerful than before. Consequently some block cipher standards, such as DES used to protect important electronic messages, have been cracked in the past years. Also due to the rapid development of hardware processing speeds, 3DES and AES may someday be solved by brute-force attacks. Basically, the common characteristics of these block cipher standards are that each time, when a standard is invoked, the same parent key is used to generate subkeys. The subkeys are then utilized in the standard’s encryption rounds to encrypt data. In fact, the variability of the key values is quite limited. Generally, producing random parameters to encrypt data is an effective method to improve the security of ciphertext. But how to ensure the security level of using and delivering these random parameters and how to avoid information leakage have been a challenge. So in this paper, we propose a novel random parameter protection approach, called the Initialization Cipher Block Method(ICBM for short), which protects random parameters by using a two-dimensional operation and employs random parameters to change the value of a fixed parent key for block ciphering, thus lowering the security risk of a block cipher algorithm. Security analysis demonstrates that the ICBM effectively improve the security level of a protected system. Of course, this also safely protect our homeland, particularly when it is applied to our governmental document delivery systems.
Chapter PDF
Similar content being viewed by others
References
FIPS Publication 46-3, Data Encryption Standard (DES), U.S. DoC/NIST (October 25, 1999)
National Institute of Standards and Technology, NIST Special Publication 800-67, Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher, Reversion 1.1 (January 2012)
FIPS Publication 197, Advanced Encryption Standard (AES), U.S. DoC/NIST (November 26, 2001)
NIST Special Publication 800-57 Recommendation for Key Management — Part 1: General (Revised) (March 2007)
Wei, K.C., Huang, Y.L., Leu, F.Y.: A Secure Communication over Wireless Environments by Using a Data Connection Core. Computers and Mathematics with Applications (in press)
Huang, Y.-L., Leu, F.-Y., Dai, C.-R.: A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional Operation. In: Quirchmayr, G., Basl, J., You, I., Xu, L., Weippl, E. (eds.) CD-ARES 2012. LNCS, vol. 7465, pp. 578–592. Springer, Heidelberg (2012)
Author information
Authors and Affiliations
Department of Computer Science, TungHai University, Taiwan
Yi-Li Huang, Fang-Yie Leu & Jing-Hao Yang
School of Information Science, Korean Bible University, South Korea
Ilsun You
- Yi-Li Huang
You can also search for this author inPubMed Google Scholar
- Fang-Yie Leu
You can also search for this author inPubMed Google Scholar
- Ilsun You
You can also search for this author inPubMed Google Scholar
- Jing-Hao Yang
You can also search for this author inPubMed Google Scholar
Editor information
Editors and Affiliations
iimt - international institute of management in technology, University of Fribourg, 1700, Fribourg, Switzerland
Stephanie Teufel
Institute of Software Technology and Interactive Systems, Vienna University of Technology, 1040, Vienna, Austria
Tjoa A Min
School of Informatic Science, Korean Bible University, Seoul, South Korea
Ilsun You
Institute of Software Technology in Interactive Systems, Vienna University of Technology and SBA Research, 1040, Vienna, Austria
Edgar Weippl
Rights and permissions
Copyright information
© 2014 IFIP International Federation for Information Processing
About this paper
Cite this paper
Huang, YL., Leu, FY., You, I., Yang, JH. (2014). Building an Initialization Cipher Block with Two-Dimensional Operation and Random Parameters. In: Teufel, S., Min, T.A., You, I., Weippl, E. (eds) Availability, Reliability, and Security in Information Systems. CD-ARES 2014. Lecture Notes in Computer Science, vol 8708. Springer, Cham. https://doi.org/10.1007/978-3-319-10975-6_12
Download citation
Publisher Name:Springer, Cham
Print ISBN:978-3-319-10974-9
Online ISBN:978-3-319-10975-6
eBook Packages:Computer ScienceComputer Science (R0)
Share this paper
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative