Vahid Khodabakhshi, Mahdi Soltani, R. Jalili, Mostafa Rezvani
{"title":"基于混沌的选择密钥(CSK)密码系统:安全VPN的新方向","authors":"Vahid Khodabakhshi, Mahdi Soltani, R. Jalili, Mostafa Rezvani","doi":"10.1109/ISCISC.2013.6767355","DOIUrl":null,"url":null,"abstract":"VPNs todays are expected to be more secure and support higher throughput for their new applications, such as Inter-Cloud VPN and Virtual Private Cloud. Blockcipher is an important security component employed in most VPNs. On the other hand, most blockciphers have mathematical weaknesses in their structures, so the attacker can use these weaknesses to break them faster than brute-force attacks. This paper proposes a new method for increasing the security of blockciphers in a much more efficient method than the cascading encryption which is another manner of having a more secure blockcipher. Our method overcomes the weaknesses of blockcipher algorithms against the cryptanalysis which uses some ciphertext/plaintext pairs to obtain the key. The method makes it hard to collect the needed pairs. Our focus in this paper is using of the proposed method in building VPNs which provide higher security and acceptable throughput. Additionally, such VPNs do not need synchronization when the underlying transport protocol is unreliable. Our analytical and practical evaluations demonstrate the satisfaction of the claims.","PeriodicalId":265985,"journal":{"name":"2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Chaos-based selective key (CSK) Cryptosystem: A new direction to secure VPN\",\"authors\":\"Vahid Khodabakhshi, Mahdi Soltani, R. Jalili, Mostafa Rezvani\",\"doi\":\"10.1109/ISCISC.2013.6767355\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"VPNs todays are expected to be more secure and support higher throughput for their new applications, such as Inter-Cloud VPN and Virtual Private Cloud. Blockcipher is an important security component employed in most VPNs. On the other hand, most blockciphers have mathematical weaknesses in their structures, so the attacker can use these weaknesses to break them faster than brute-force attacks. This paper proposes a new method for increasing the security of blockciphers in a much more efficient method than the cascading encryption which is another manner of having a more secure blockcipher. Our method overcomes the weaknesses of blockcipher algorithms against the cryptanalysis which uses some ciphertext/plaintext pairs to obtain the key. The method makes it hard to collect the needed pairs. Our focus in this paper is using of the proposed method in building VPNs which provide higher security and acceptable throughput. Additionally, such VPNs do not need synchronization when the underlying transport protocol is unreliable. Our analytical and practical evaluations demonstrate the satisfaction of the claims.\",\"PeriodicalId\":265985,\"journal\":{\"name\":\"2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)\",\"volume\":\"31 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISCISC.2013.6767355\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCISC.2013.6767355","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Chaos-based selective key (CSK) Cryptosystem: A new direction to secure VPN
VPNs todays are expected to be more secure and support higher throughput for their new applications, such as Inter-Cloud VPN and Virtual Private Cloud. Blockcipher is an important security component employed in most VPNs. On the other hand, most blockciphers have mathematical weaknesses in their structures, so the attacker can use these weaknesses to break them faster than brute-force attacks. This paper proposes a new method for increasing the security of blockciphers in a much more efficient method than the cascading encryption which is another manner of having a more secure blockcipher. Our method overcomes the weaknesses of blockcipher algorithms against the cryptanalysis which uses some ciphertext/plaintext pairs to obtain the key. The method makes it hard to collect the needed pairs. Our focus in this paper is using of the proposed method in building VPNs which provide higher security and acceptable throughput. Additionally, such VPNs do not need synchronization when the underlying transport protocol is unreliable. Our analytical and practical evaluations demonstrate the satisfaction of the claims.