DOI QR코드

DOI QR Code

Design of Triple Key Security Algorithm and Identification of Single-key Attack on Multiple Rounds in Mobile Communications

  • Muhammad Akram (The Institute of Management Sciences (PAK-AIMS)) ;
  • Syed Ashraf Ali (The Institute of Management Sciences (PAK-AIMS)) ;
  • C. A.Rahim (The Institute of Management Sciences (PAK-AIMS))
  • 투고 : 2024.10.05
  • 발행 : 2024.10.30

초록

In cipher algorithms, encryption and decryption is based on the same key. There are some limitations in cipher algorithms, for example in polyalphabetic substitution cipher the key size must be equal to plaintext otherwise it will be repeated and if the key is known then encryption become useless. This paper aims to improve the said limitations by a proposed algorithm TKSA in which the key is modified on polyalphabetic substitution cipher to maintain the size of key and plaintext. Each plaintext character is substituted by alternative message. The mode of substitution is transformed cyclically which depends on a current position of the modified communication. Three keys are used in encryption and decryption process on 8 or 16 rounds with the XOR of 1st key. This study also identifies a single-key attack on multiple rounds block cipher in mobile communications and applied the proposed technique to prevent the attack. By utilization of the TKSA algorithm, the decryption is illustrated, and security is analyzed in detail with mathematical examples.

키워드

참고문헌

  1. Ritu Tripathi1, Sanjay Agrawal2 "Comparative Study of Symmetric and Asymmetric Cryptography Techniques" International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 1, Issue 6, June 2014. ISSN 2348 - 4853 
  2. H. Fathima, K.S.R. Matriculation & K.S.R. Kalvi nagar, "Comparative Study of Symmetric Key Algorithms-Des, AES and Blowfish", International Research Journal Volume 17 Issue 2 Version 1.0 Year 2017 
  3. Sangeeta & Er. Arpneek Kaur," A Review on Symmetric Key Cryptography Algorithms", Volume 8, No. 4, May 2017 (Special Issue) 
  4. Rabie A. Mahmoud, A. Baith Mohamed, Magdy Saeb, "Enhancing KASUMI Security by Affixing A Metamorphic Function and the Ensuing Hardware Implementation", International Journal of Computer Science and Communication Security (IJCSCS), Vol. 6, January 2016 
  5. Monika Agrawal, Pradeep Mishra, "Comparative Survey on Symmetric Key Encryption Techniques", International Journal on Computer Science and Engineering (IJCSE), Vol. 4 No. 05 May 2012 
  6. Krishna Kumar Pandey, Vikas Rangari & Sitesh KumarSinha, "An Enhanced Symmetric Key Cryptography Algorithm to Improve Data Security," International Journal of Computer Applications (0975 - 8887) Volume 74- No. 20, July 2013 
  7. DiffiHellman,https://www.sciencedirect.com/topics/computer-science/diffie-hellman 
  8. Gurpreet Singh, Supriya, "A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security", International Journal of Computer Applications, Volume 67- No.19, April 2013 
  9. Elaine Barker, Allen Roginsky, "Transitioning the Use of Cryptographic Algorithms and Key Lengths", NIST Special Publication 800-131A Revision 2, March 2019
  10. D.Prasad ,G.P.Arya, C.Chaudhary, V.Kumar, "ENCIPHER A Text Encryption and Decryption Technique Using Substitution-Transposition and Basic Arithmetic and Logic Operation", International Journal of Computer Science and Information Technologies, Vol. 5 (2) , 2014
  11. T Perrin, M Marlinspike, "The Double Ratchet Algorithm", revision 2016, available at https://signal.org/docs/specifications/doubleratchet/doubleratchet.pdf. 
  12. B.Zhao, X.Dong, W.Meier, K.Jia, G.Wang, "Generalized Related-Key Rectangle Attacks on Block Ciphers with Linear Key Schedule", JOURNAL OF LATEX CLASS FILES, VOL. XXX, NO. XXX, JUNE 2019
  13. T Anand, M Shanmugam, B Santhoshini, "Rainbow table attack on 3rd generation GSM Telephony secure algorithm - A5/3", International Journal of Recent Technology and Engineering (IJRTE), Volume-7, Issue-5S4, February 2019
  14. Raja Muthalagu, Subeen Jain, "Modifying LFSR of ZUC to Reduce Time for Key-Stream Generation", Journal of Cyber Security, Vol. 5 4, 257-268, Publication 4 August 2017