An adaptive security framework with extensible computational complexity for cipher systems

Prathap Siddavaatam, R. Sedaghat, M. Cheng
{"title":"An adaptive security framework with extensible computational complexity for cipher systems","authors":"Prathap Siddavaatam, R. Sedaghat, M. Cheng","doi":"10.1109/ICITST.2016.7856683","DOIUrl":null,"url":null,"abstract":"Algebraic cryptanalysis, uses a range of algebraic tools and techniques to assess the security of cryptosystems, which are essential for trusted communications over open networks. Recent trends in algebraic cryptanalysis tend to use Modular Addition 2n over logic Exclusive-OR as a mixing operator to guard against security threats. We propose a newly designed framework for Modular Addition over field GF(2) satisfying the algebraic properties of regular Modular Addition 2n albeit with cumulative security enhancements and increased complexity to address these challenges. Nevertheless, it has been observed that the complexity of Modular Addition can be drastically decreased with the appropriate formulation of polynomial equations and probabilistic conditions. In this article we propose a new extended design framework for advanced Modular Addition and it is characterized by user-specified extendable security which does not impose additional changes in existing layout of ciphers including both stream and block ciphers. This framework can be rapidly scaled to use-specific requirements which boosts the algebraic degree of the overall structure. This, in turn it thwarts the probabilistic conditions by retaining the original hardware complexity sans critical modifications of Modular Addition 2n.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITST.2016.7856683","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Algebraic cryptanalysis, uses a range of algebraic tools and techniques to assess the security of cryptosystems, which are essential for trusted communications over open networks. Recent trends in algebraic cryptanalysis tend to use Modular Addition 2n over logic Exclusive-OR as a mixing operator to guard against security threats. We propose a newly designed framework for Modular Addition over field GF(2) satisfying the algebraic properties of regular Modular Addition 2n albeit with cumulative security enhancements and increased complexity to address these challenges. Nevertheless, it has been observed that the complexity of Modular Addition can be drastically decreased with the appropriate formulation of polynomial equations and probabilistic conditions. In this article we propose a new extended design framework for advanced Modular Addition and it is characterized by user-specified extendable security which does not impose additional changes in existing layout of ciphers including both stream and block ciphers. This framework can be rapidly scaled to use-specific requirements which boosts the algebraic degree of the overall structure. This, in turn it thwarts the probabilistic conditions by retaining the original hardware complexity sans critical modifications of Modular Addition 2n.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一种具有可扩展计算复杂度的密码系统自适应安全框架
代数密码分析使用一系列代数工具和技术来评估密码系统的安全性,这对于开放网络上的可信通信至关重要。在代数密码分析中,最近的趋势倾向于使用模加法2n而不是逻辑异或作为混合算子来防范安全威胁。我们提出了一个新设计的域GF(2)上的模加法框架,满足常规模加法2n的代数性质,尽管具有累积安全性增强和增加的复杂性来解决这些挑战。然而,已经观察到,在多项式方程和概率条件的适当表述下,模加法的复杂性可以大大降低。在本文中,我们提出了一个新的扩展设计框架,用于高级模块化加法,它的特点是用户指定的可扩展安全性,它不会对现有的密码布局(包括流密码和分组密码)施加额外的变化。该框架可以快速扩展到使用特定的需求,从而提高了整体结构的代数程度。反过来,它通过保留原始硬件复杂性而无需对模块化加法2n进行关键修改来阻止概率条件。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Which metrics for vertex-cut partitioning? Compressive Sensing encryption modes and their security Range query integrity in the cloud: the case of video surveillance Performance study of the index structures in audited environment System and Protocols for secure Intercloud Communications
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1