Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Advertisement

Springer Nature Link
Log in

Building an Initialization Cipher Block with Two-Dimensional Operation and Random Parameters

  • Conference paper

Part of the book series:Lecture Notes in Computer Science ((LNISA,volume 8708))

  • 1229Accesses

Abstract

In recent years, parallel computing capabilities have been more powerful than before. Consequently some block cipher standards, such as DES used to protect important electronic messages, have been cracked in the past years. Also due to the rapid development of hardware processing speeds, 3DES and AES may someday be solved by brute-force attacks. Basically, the common characteristics of these block cipher standards are that each time, when a standard is invoked, the same parent key is used to generate subkeys. The subkeys are then utilized in the standard’s encryption rounds to encrypt data. In fact, the variability of the key values is quite limited. Generally, producing random parameters to encrypt data is an effective method to improve the security of ciphertext. But how to ensure the security level of using and delivering these random parameters and how to avoid information leakage have been a challenge. So in this paper, we propose a novel random parameter protection approach, called the Initialization Cipher Block Method(ICBM for short), which protects random parameters by using a two-dimensional operation and employs random parameters to change the value of a fixed parent key for block ciphering, thus lowering the security risk of a block cipher algorithm. Security analysis demonstrates that the ICBM effectively improve the security level of a protected system. Of course, this also safely protect our homeland, particularly when it is applied to our governmental document delivery systems.

Similar content being viewed by others

Keywords

References

  1. FIPS Publication 46-3, Data Encryption Standard (DES), U.S. DoC/NIST (October 25, 1999)

    Google Scholar 

  2. National Institute of Standards and Technology, NIST Special Publication 800-67, Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher, Reversion 1.1 (January 2012)

    Google Scholar 

  3. FIPS Publication 197, Advanced Encryption Standard (AES), U.S. DoC/NIST (November 26, 2001)

    Google Scholar 

  4. http://en.wikipedia.org/wiki/Data_Encryption_Standard

  5. NIST Special Publication 800-57 Recommendation for Key Management — Part 1: General (Revised) (March 2007)

    Google Scholar 

  6. Wei, K.C., Huang, Y.L., Leu, F.Y.: A Secure Communication over Wireless Environments by Using a Data Connection Core. Computers and Mathematics with Applications (in press)

    Google Scholar 

  7. Huang, Y.-L., Leu, F.-Y., Dai, C.-R.: A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional Operation. In: Quirchmayr, G., Basl, J., You, I., Xu, L., Weippl, E. (eds.) CD-ARES 2012. LNCS, vol. 7465, pp. 578–592. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Department of Computer Science, TungHai University, Taiwan

    Yi-Li Huang, Fang-Yie Leu & Jing-Hao Yang

  2. School of Information Science, Korean Bible University, South Korea

    Ilsun You

Authors
  1. Yi-Li Huang

    You can also search for this author inPubMed Google Scholar

  2. Fang-Yie Leu

    You can also search for this author inPubMed Google Scholar

  3. Ilsun You

    You can also search for this author inPubMed Google Scholar

  4. Jing-Hao Yang

    You can also search for this author inPubMed Google Scholar

Editor information

Editors and Affiliations

  1. iimt - international institute of management in technology, University of Fribourg, 1700, Fribourg, Switzerland

    Stephanie Teufel

  2. Institute of Software Technology and Interactive Systems, Vienna University of Technology, 1040, Vienna, Austria

    Tjoa A Min

  3. School of Informatic Science, Korean Bible University, Seoul, South Korea

    Ilsun You

  4. Institute of Software Technology in Interactive Systems, Vienna University of Technology and SBA Research, 1040, Vienna, Austria

    Edgar Weippl

Rights and permissions

Copyright information

© 2014 IFIP International Federation for Information Processing

About this paper

Cite this paper

Huang, YL., Leu, FY., You, I., Yang, JH. (2014). Building an Initialization Cipher Block with Two-Dimensional Operation and Random Parameters. In: Teufel, S., Min, T.A., You, I., Weippl, E. (eds) Availability, Reliability, and Security in Information Systems. CD-ARES 2014. Lecture Notes in Computer Science, vol 8708. Springer, Cham. https://doi.org/10.1007/978-3-319-10975-6_12

Download citation

Publish with us


[8]ページ先頭

©2009-2025 Movatter.jp