A multi-shape hybrid symmetric encryption algorithm to thwart attacks based on the knowledge of the used cryptographic suite

This research paper introduces a novel symmetric encryption algorithm that provides the confidentiality security service without leaking enough information about the exact encryption algorithm or other cryptographic parameters to anyone except the legitimate receiver. This is achieved by utilizing a...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Journal of information security and applications Ročník 46; s. 210 - 221
Hlavní autoři: Altigani, Abdelrahman, Hasan, Shafaatunnur, Shamsuddin, Siti Mariyam, Barry, Bazara
Médium: Journal Article
Jazyk:angličtina
Vydáno: Elsevier Ltd 01.06.2019
Témata:
ISSN:2214-2126
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Popis
Shrnutí:This research paper introduces a novel symmetric encryption algorithm that provides the confidentiality security service without leaking enough information about the exact encryption algorithm or other cryptographic parameters to anyone except the legitimate receiver. This is achieved by utilizing a set of sound existing symmetric encryption algorithms, namely, the Advanced Encryption Standard,MARS,RC6, Serpent and Twofish. The identity of the algorithm used to secure the current message, along with other cryptographic parameters (e.g. mode of operation, key length), are hidden from anyone except the legitimate receiver. These parameters are shared securely between communicating parties by utilizing some of the symmetric key bits. The cipher suite in addition to the encryption key, changes systematically and securely with every new message, leaving the opponent with no enough information to launch any effective attack. The algorithm performance is tested, and the overall performance is close to the performance of conventional encryption with a delay of about 16.52 CPU Cycles per message. From a security point of view, the possibility of cryptanalysis is diminished significantly, as no party except communicating parties has any knowledge of the cryptographic parameters in use.
ISSN:2214-2126
DOI:10.1016/j.jisa.2019.03.013