Patterned Cipher Block for Low-Latency Secure Communication

Despite the increasing importance of network security, increasing Internet of Things (IoT) uptake and traffic tends to apply tighter resource constraints for cryptography. To cope with the constraints, security systems must choose between time cost and security. Cyber-attack model evolution and quantum computing technologies have severely limited current cryptography uptake and imposed too much overhead to operate effectively on lightweight communication environments. Therefore, we propose a new operation mode using multiple symmetric key ciphers alternately in a regularized order. The proposed design exploits lightweight cryptography methods, reducing encryption/decryption overhead compared to a single heavy cryptography approach, as well as avoiding exhaustive key extraction attack. Since sequences can change both time cost and security performance widely, the design can be applied to various situations, from the delay-constrained communications to highly secure networks. Our cryptography design incorporates patterned cipher block (PCB) operation, an integrity verification technique to identify if a ciphertext has been forged, handshaking protocol exchanging pattern information and a key using two-round communication, and pattern optimization to maximize the cryptographic performance. We confirmed the proposed operation mode numerically, and verified the outcomes experimentally, confirming that the proposed scheme outperformed current best practice cryptography.

[1]  Daniel J. Bernstein,et al.  Introduction to post-quantum cryptography , 2009 .

[2]  Willi Meier,et al.  Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.

[3]  Jugal K. Kalita,et al.  Network attacks: Taxonomy, tools and systems , 2014, J. Netw. Comput. Appl..

[4]  Joan Daemen,et al.  Cipher and hash function design strategies based on linear and differential cryptanalysis , 1995 .

[5]  Chris J. Mitchell Cryptanalysis of Two Variants of PCBC Mode When Used for Message Integrity , 2005, ACISP.

[6]  Paul C. van Oorschot,et al.  Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..

[7]  Jerome A. Solinas,et al.  AES Galois Counter Mode for the Secure Shell Transport Layer Protocol , 2009, RFC.

[8]  Kuo Tsang Huang A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers , 2013 .

[9]  Alex Biryukov,et al.  Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds , 2010, IACR Cryptol. ePrint Arch..

[10]  Walid Abdallah,et al.  Adaptive QoS and Security for Video Transmission over Wireless Networks: A Cognitive-Based Approach , 2014, ICA3PP.

[11]  Man Young Rhee Cryptography and Secure Communications , 1993 .

[12]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.3 , 2018, RFC.

[13]  D. McGrew,et al.  The Galois/Counter Mode of Operation (GCM) , 2005 .

[14]  Jerome A. Solinas,et al.  Suite B Cryptographic Suites for IPsec , 2007, RFC.

[15]  Vincent Rijmen,et al.  Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds , 1993, CRYPTO.

[16]  Jonathan Lennox,et al.  Encryption of Header Extensions in the Secure Real-time Transport Protocol (SRTP) , 2013, RFC.

[17]  Morris J. Dworkin,et al.  Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .

[18]  Rob Adams,et al.  The ESP CBC-Mode Cipher Algorithms , 1998, RFC.

[19]  Mark Ryan,et al.  Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks , 2005, SecCo.

[20]  Daniel Smith-Tone,et al.  Report on Post-Quantum Cryptography , 2016 .

[21]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[22]  Sasa Mrdovic,et al.  Kerckhoffs' principle for intrusion detection , 2008, Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium.

[23]  Ruhai Wang,et al.  NIS05-1: Performance Analysis of Advanced Encryption Standard (AES) , 2006, IEEE Globecom 2006.

[24]  Michal Podpora,et al.  Comparison of Three CPU-Core Families for IoT Applications in Terms of Security and Performance of AES-GCM , 2020, IEEE Internet of Things Journal.

[25]  Daesung Kwon,et al.  New Block Cipher: ARIA , 2003, ICISC.

[26]  Kjell Hausken and Gregory Levitin Review of Systems Defense and Attack Models , 2012, International Journal of Performability Engineering.

[27]  Russ Housley,et al.  Suite B Profile for Transport Layer Security (TLS) , 2009, RFC.

[28]  Hyangjin Lee,et al.  The SEED Encryption Algorithm , 2005, RFC.