A New Method for Format Preserving Encryption in High-Data Rate Communications

In some encryption systems it is necessary to preserve the format and length of the encrypted data. This kind of encryption is called FPE (Format Preserving Encryption). Currently, only two AES (Advanced Encryption Standard) modes of operation recommended by the NIST (National Institute of Standards and Technology) are able to implement FPE algorithms, FF1 and FF3. These modes work in an electronic codebook fashion and can be configured to encrypt databases with an arbitrary format and length. However, there are no stream cipher proposals able to implement FPE encryption for high data rate information flows. The main novelty of this work is a new block cipher operation mode proposal to implement an FPE algorithm in a stream cipher fashion. It has been called CTR-MOD and it is based on a standard block cipher working in CTR (Counter) mode and a modulo operation. The confidentiality of this mode is analyzed in terms of its IND- CPA (Indistinguishability under Chosen Plaintext Attack) advantage of any adversary attacking it. Moreover, the encryption scheme has been implemented on an FPGA (Field Programmable Gate Array) and has been integrated in a Gigabit Ethernet interface to test an encrypted optical link with a real high data rate traffic flow.

[1]  Phillip Rogaway,et al.  A Synopsis of Format-Preserving Encryption , 2010 .

[2]  Silvio Dragone,et al.  The next generation of highly reliable and secure encryption for the IBM z13 , 2015, IBM J. Res. Dev..

[3]  Baojiang Cui,et al.  A Data Masking Scheme for Sensitive Big Data Based on Format-Preserving Encryption , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[4]  S. Ramachandram,et al.  Performance analysis of Format Preserving Encryption (FIPS PUBS 74-8) over block ciphers for numeric data , 2013, 2013 4th International Conference on Computer and Communication Technology (ICCCT).

[5]  J. Hizanidis,et al.  Enhancement of Chaos Encryption Potential by Combining All-Optical and Electrooptical Chaos Generators , 2010, IEEE Journal of Quantum Electronics.

[6]  Weisheng Hu,et al.  Dynamic QAM Mapping for Physical-Layer Security Using Digital Chaos , 2018, IEEE Access.

[7]  Tsutomu Sasao,et al.  Fast Hardware Computation of x Mod z , 2011, 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum.

[8]  Carlos Sánchez-Azqueta,et al.  Chaotic Encryption Applied to Optical Ethernet in Industrial Control Systems , 2019, IEEE Transactions on Instrumentation and Measurement.

[9]  Thomas Peyrin,et al.  BPS : a Format-Preserving Encryption Proposal , 2010 .

[10]  Paul R. Prucnal,et al.  Optical Layer Security in Fiber-Optic Networks , 2011, IEEE Transactions on Information Forensics and Security.

[11]  Carlos Sánchez-Azqueta,et al.  Physical Layer Encryption for Industrial Ethernet in Gigabit Optical Links , 2019, IEEE Transactions on Industrial Electronics.

[12]  Morris Dworkin 800-38 G Recommendation for Block Cipher Modes of Operation : Methods for Format-Preserving Encryption , 2013 .

[13]  Sang Su Lee,et al.  Encoding of Korean characters with less radix in format-preserving encryption , 2015, 2015 International Conference on Information and Communication Technology Convergence (ICTC).

[14]  Philipp Marcus,et al.  GeoFPE: Format Preserving Encryption of Geospatial Data for the Internet of Things , 2018, 2018 IEEE International Congress on Internet of Things (ICIOT).

[15]  Mihir Bellare,et al.  A concrete security treatment of symmetric encryption , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.

[16]  Yehuda Lindell,et al.  Introduction to Modern Cryptography , 2004 .

[17]  Joachim Vance VAES 3 scheme for FFX An addendum to “ The FFX Mode of Operation for Format-Preserving Encryption ” , 2011 .

[18]  Yan Sun,et al.  Data Hiding for Ensuring the Quality of the Host Image and the Security of the Message , 2019, IEEE Access.

[19]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[20]  Ku-Young Chang,et al.  Performance Analysis of Format-Preserving Encryption Based on Unbalanced-Feistel Structure , 2015, CSA/CUTE.

[21]  Kangbin Yim,et al.  A Novel Message-Preserving Scheme with Format-Preserving Encryption for Connected Cars in Multi-Access Edge Computing , 2019, Sensors.

[22]  Marwan Krunz,et al.  Full Frame Encryption and Modulation Obfuscation Using Channel-Independent Preamble Identifier , 2016, IEEE Transactions on Information Forensics and Security.

[23]  Jie Liu,et al.  Format-preserving encryption for Excel , 2016, 2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW).

[24]  Su Hu,et al.  Physical Layer Security in 5G Based Large Scale Social Networks: Opportunities and Challenges , 2018, IEEE Access.

[25]  Shuang Liang,et al.  Efficient Format-Preserving Encryption Mode for Integer , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[26]  Sashank Dara,et al.  Efficient Format Preserving encrypted databases , 2015, 2015 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT).

[27]  Jingwei Li,et al.  Format-Preserving Encryption for Character Data , 2012, J. Networks.

[28]  Ke Wang,et al.  Performance analysis of physical-layer security in an OCDMA-based wiretap channel , 2017, IEEE/OSA Journal of Optical Communications and Networking.