[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Conception of efficient key-dependent binary diffusion matrix structures for dynamic cryptographic algorithms

Published: 01 August 2023 Publication History

Abstract

The existing static cryptographic algorithms suffer from different performance and security challenges. These limitations are attributed to their fixed structure, where the substitution and diffusion primitives maintain the same values throughout the process. In this paper, we present a new framework of a dynamic binary diffusion matrix with flexible dimensions (n × n). The proposed solution replaces the static diffusion primitives, in existing symmetric and un-keyed cryptographic algorithms, with dynamic primitives. We define six different dynamic and flexible binary diffusion forms, four that are invertible, and two that are non-invertible, and hence, they could be used for different security services. However, using a single diffusion form does not always guarantee the required cryptographic properties. To that effect, we propose a binary multiplication scheme of a dynamic primary matrix and its transposed form, which yields the desired efficiency, and provides good resistance against recent implementation attacks, yet without degrading the system performance. We conduct security and performance analyses to validate the effectiveness of the proposed solution. The results confirm the cryptographic performance in terms of the linear branch number and the number of fixed points. In this context, the best-obtained branch number is 4 for n = 8 and 5 for n = 12 for the invertible forms, while for the non-invertible ones, the best branch number is 3 for n = 8 and 4 for n = 12. Moreover, in terms of the number of fixed points, the obtained numbers are very close to 0 for the invertible and non-invertible forms.

References

[1]
Menezes A.J., Van Oorschot P.C., Vanstone S.A., Handbook of applied cryptography, 1997, cited By (since 1996)5122.
[2]
Stallings William, Cryptography and network security: Principles and practice, Pearson Upper Saddle River, NJ, 2017.
[3]
Chou Edward, Tramèr Florian, Pellegrino Giancarlo, Boneh Dan, SentiNet: Detecting physical attacks against deep learning systems, 2018, CoRR abs/1812.00292.
[4]
Schneier Bruce, Description of a new variable-length key, 64-bit block cipher (blowfish), in: Anderson Ross (Ed.), Fast software encryption, in: Lecture notes in computer science, vol. 809, Springer Berlin Heidelberg, 1994, pp. 191–204.
[5]
Miller Frederic P., Vandome Agnes F., McBrewster John, Advanced encryption standard, Alpha Press, 2009.
[6]
Nakahara J. Jr., Abrahão E., A new involutory MDS matrix for the AES, Int J Netw Secur 9 (2) (2009) 109–116.
[7]
Aoki K., Ichikawa T., Kanda M., Matsui M., Moriai S., Nakajima J., et al., Camellia: A 128-bit block cipher suitable for multiple platforms - Design and analysis, LNCS 2012 (2012) (2001) 39–56.
[8]
Kwon D., Kim J., Park S., Sung S.H., Sohn Y., Song J.H., et al., New block cipher: ARIA, Lecture notes in computer science (Including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol. 2971, 2004, pp. 432–445. cited By (since 1996)22.
[9]
Kwon D., Sung S.H., Song J.H., Park S., Design of block ciphers and coding theory, Trends Math 8 (1) (2005) 13–20.
[10]
Koo BonWook, Jang HwanSeok, Song JungHwan, Constructing and cryptanalysis of a 16 × 16 binary matrix as a diffusion layer, in: Chae Ki-Joon, Yung Moti (Eds.), Information security applications, in: Lecture notes in computer science, vol. 2908, Springer Berlin Heidelberg, 2004, pp. 489–503.
[11]
Koo BonWook, Jang HwanSeok, Song JungHwan, On constructing of a 32 ×32 binary matrix as a diffusion layer for a 256-bit block cipher, in: Rhee MinSurp, Lee Byoungcheon (Eds.), Information security and cryptology – ICISC 2006, in: Lecture notes in computer science, vol. 4296, Springer Berlin Heidelberg, 2006, pp. 51–64.
[12]
Aslan B., Sakalli M.T., Algebraic construction of cryptographically good binary linear transformations, Secur Commun Netw 7 (1) (2014) 53–63.
[13]
Sakallı Muharrem Tolga, Akleylek Sedat, Aslan Bora, Bulus Ercan, Sakallı Fatma Büyüksaraçoglu. On the construction of 20 × 20 and 24 × 24 Binary matrices with good implementation properties for lightweight block ciphers and hash functions.
[14]
Sakallı Muharrem Tolga, Akleylek Sedat, Aslan Bora, Buluş Ercan, Sakallı Fatma Büyüksaraçoğlu, On the construction of and binary matrices with good implementation properties for lightweight block ciphers and hash functions, Math Probl Eng 2014 (2014).
[15]
Noura Hassan, Martin Steven, Al Agha Khaldoun, Chahine Khaled, ERSS-RLNC: Efficient and robust secure scheme for random linear network coding, Comput Netw 75, Part A (2014) 99–112.
[16]
Noura Hassan, Courousse Damien, Method of encryption with dynamic diffusion and confusion layers, 2021, US Patent 10,903,978.
[17]
Dai A, Kim C, Kim J. Invertibility probability of binary matrices.
[18]
Noura Hassan. Design and simulation of efficient chaos based generators, crypto-systems and hash functions. [Ph.D. thesis].
[19]
Noura Hassan, Martin Steven, Al Agha Khaldoun. E3SN - efficient security scheme for sensor networks. In: SECRYPT - 10th international conference on security and cryptography. Reykjavik, Iceland; 2013.
[20]
Noura Hassan N, Salman Ola, Couturier Raphaël, Chehab Ali, LoRCA: Lightweight round block and stream cipher algorithms for IoV systems, Veh Commun (2021).
[21]
Noura Hassan N, Noura Mohamad, Chehab Ali, Mansour Mohammad M, Couturier Raphaël, Efficient and secure cipher scheme for multimedia contents, Multimedia Tools Appl 78 (2019) 1–30.
[22]
Noura Hassan, Chehab Ali, Noura Mohamad, Couturier Raphaël, Mansour Mohammad M, Lightweight, dynamic and efficient image encryption scheme, Multimedia Tools Appl (2018) 1–35.
[23]
Noura Hassan, Sleem Lama, Noura Mohamad, Mansour Mohammad M, Chehab Ali, Couturier Raphaël, A new efficient lightweight and secure image cipher scheme, Multimedia Tools Appl (2017) 1–28.
[24]
Noura Hassan N., Chehab Ali, Couturier Raphael, Efficient & secure cipher scheme with dynamic key-dependent mode of operation, Signal Process, Image Commun 78 (2019) 448–464.
[25]
Daemen Joan, Rijmen Vincent, The design of Rijndael, SpringerVerlag New York, Inc., Secaucus, NJ, USA, 2002.
[26]
Z’aba Muhammad Reza, Analysis of linear relationships in block ciphers, [Ph.D. thesis] Queensland University of Technology, 2010.
[27]
Bilmes J, Asanovic K, Chin C, Demmel J. Optimizing matrix multiply using PHiPAC: A portable, high-performance, Ansi C coding methodology. In: International conference on supercomputing. 1997.
[28]
Brent R.P., Algorithms for matrix multiplication, Stanford University, 1970.
[29]
Daemen Joan, Rijmen Vincent, The design of Rijndael: AES-the advanced encryption standard, Springer Science & Business Media, 2013.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Journal of Information Security and Applications
Journal of Information Security and Applications  Volume 76, Issue C
Aug 2023
327 pages

Publisher

Elsevier Science Inc.

United States

Publication History

Published: 01 August 2023

Author Tags

  1. Binary diffusion matrix
  2. Dynamic diffusion primitives
  3. Dynamic cryptographic algorithms
  4. Flexible diffusion matrix
  5. Fixed points
  6. Linear branch number

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Jan 2025

Other Metrics

Citations

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media