Cryptanalysis and designing chaos-based irreversible and parallel key expansion module over Galois field

12/11/2022
by   Hongjun Liu, et al.
0

From the security criteria of irreversibility, parallelizability and independence, we cryptanalyzed the key expansion modules of candidate block ciphers of AES, the results revealed that there exist some weaknesses inside, which may be explored by the attacker. Hence, we designed a more secure key expansion module that the round-key can satisfy three criteria above. First, we constructed a non-degenerate 2D chaotic map (2D-πeCM) with ergodicity in phase space and sufficient large chaotic range. Then based on 2D-πeCM and polynomial multiplication over Galois field, we designed an irreversible key expansion module, which could transform the initial key of arbitrary length to desired number of independent round keys in parallel. Security and statistical results demonstrated the flexible and effectiveness of the proposed key expansion module.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/09/2021

Cryptanalyze and design strong S-Box using 2D chaotic map and apply to irreversible key expansion

Cryptanalysis result of key expansion algorithms in AES and SM4 revealed...
research
01/30/2020

Analysis of Y00 Protocol under Quantum Generalization of a Fast Correlation Attack: Toward Information-Theoretic Security

In our previous work, it was demonstrated that the attacker could not pi...
research
02/05/2022

A proof of P != NP (New symmetric encryption algorithm against any linear attacks and differential attacks)

P vs NP problem is the most important unresolved problem in the field of...
research
10/17/2018

Understanding the Related-Key Security of Feistel Ciphers from a Provable Perspective

We initiate the provable related-key security treatment for models of pr...
research
06/16/2019

A Comprehensive Formal Security Analysis and Revision of the Two-phase Key Exchange Primitive of TPM 2.0

The Trusted Platform Module (TPM) version 2.0, which has been demonstrat...
research
05/19/2022

A Comparative Study of Feature Expansion Unit for 3D Point Cloud Upsampling

Recently, deep learning methods have shown great success in 3D point clo...
research
11/22/2021

Chaos and Logistic Map based Key Generation Technique for AES-driven IoT Security

Several efforts have been seen claiming the lightweight block ciphers as...

Please sign up or login with your details

Forgot password? Click here to reset