Z. Muda, Abdeladeem Ab. Ahfaidha, N. Udzir, R. Mahmod
{"title":"一种基于位级扩散同步流密码的数据加密新方法","authors":"Z. Muda, Abdeladeem Ab. Ahfaidha, N. Udzir, R. Mahmod","doi":"10.4156/IJACT.VOL5.ISSUE11.12","DOIUrl":null,"url":null,"abstract":"Most proposed stream ciphers are cracked through vulnerability of input and output. This paper is focused on the encryption function and the security tradeoff between pseudorandom number generators and the encryption function. Despite the focus on the security of the key generation, there is still considerable potential for attacks on the secret key as long as the encryption function leaks valuable information about the key to the attacker. Hence, it is important to study the possibility of constructing a new encryption model based on a stream cipher, while \nconsidering security and throughput tradeoffs. In this paper a new approach to data encryption based on its integration with a synchronous stream cipher is presented. This new approach is named the “Permuted Synchronous Stream Cipher” (PSSC). The sophisticated design of the PSSC for providing diffusion to stream ciphers allows it to be easily incorporated into most of the existing proposed stream ciphers to provide better security. The PSSC key stream is constructed from two parts, namely the key- \nbits and a corresponding diffusion maps. The method involves inserting random bits into the ciphertext \nfollowed by bit rotation and XORing bitwise. Therefore, any statistical pattern or information about the secret key that may be reflected in or leaked into the cipher’s output can be masked by performing simple bit diffusion on the ciphertext based on a pseudorandom sequence of diffusion maps. We believe that the proposed method can achieve a throughput rate that is fast enough for real-time data \nprotection with better security.","PeriodicalId":90538,"journal":{"name":"International journal of advancements in computing technology","volume":"5 1","pages":"109-117"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A new approach to data encryption based on the synchronous stream cipher with bit-level diffusion\",\"authors\":\"Z. Muda, Abdeladeem Ab. Ahfaidha, N. Udzir, R. Mahmod\",\"doi\":\"10.4156/IJACT.VOL5.ISSUE11.12\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Most proposed stream ciphers are cracked through vulnerability of input and output. This paper is focused on the encryption function and the security tradeoff between pseudorandom number generators and the encryption function. Despite the focus on the security of the key generation, there is still considerable potential for attacks on the secret key as long as the encryption function leaks valuable information about the key to the attacker. Hence, it is important to study the possibility of constructing a new encryption model based on a stream cipher, while \\nconsidering security and throughput tradeoffs. In this paper a new approach to data encryption based on its integration with a synchronous stream cipher is presented. This new approach is named the “Permuted Synchronous Stream Cipher” (PSSC). The sophisticated design of the PSSC for providing diffusion to stream ciphers allows it to be easily incorporated into most of the existing proposed stream ciphers to provide better security. The PSSC key stream is constructed from two parts, namely the key- \\nbits and a corresponding diffusion maps. The method involves inserting random bits into the ciphertext \\nfollowed by bit rotation and XORing bitwise. Therefore, any statistical pattern or information about the secret key that may be reflected in or leaked into the cipher’s output can be masked by performing simple bit diffusion on the ciphertext based on a pseudorandom sequence of diffusion maps. We believe that the proposed method can achieve a throughput rate that is fast enough for real-time data \\nprotection with better security.\",\"PeriodicalId\":90538,\"journal\":{\"name\":\"International journal of advancements in computing technology\",\"volume\":\"5 1\",\"pages\":\"109-117\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-07-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International journal of advancements in computing technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4156/IJACT.VOL5.ISSUE11.12\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International journal of advancements in computing technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4156/IJACT.VOL5.ISSUE11.12","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A new approach to data encryption based on the synchronous stream cipher with bit-level diffusion
Most proposed stream ciphers are cracked through vulnerability of input and output. This paper is focused on the encryption function and the security tradeoff between pseudorandom number generators and the encryption function. Despite the focus on the security of the key generation, there is still considerable potential for attacks on the secret key as long as the encryption function leaks valuable information about the key to the attacker. Hence, it is important to study the possibility of constructing a new encryption model based on a stream cipher, while
considering security and throughput tradeoffs. In this paper a new approach to data encryption based on its integration with a synchronous stream cipher is presented. This new approach is named the “Permuted Synchronous Stream Cipher” (PSSC). The sophisticated design of the PSSC for providing diffusion to stream ciphers allows it to be easily incorporated into most of the existing proposed stream ciphers to provide better security. The PSSC key stream is constructed from two parts, namely the key-
bits and a corresponding diffusion maps. The method involves inserting random bits into the ciphertext
followed by bit rotation and XORing bitwise. Therefore, any statistical pattern or information about the secret key that may be reflected in or leaked into the cipher’s output can be masked by performing simple bit diffusion on the ciphertext based on a pseudorandom sequence of diffusion maps. We believe that the proposed method can achieve a throughput rate that is fast enough for real-time data
protection with better security.