High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive

In this paper we combine the error correction and encryption functionality into one block cipher, which we call High Diffusion (HD) cipher. The error correcting property of this cipher is due to the novel error correction code which we call High Diffusion code used in its diffusion layer. Theoretical bounds on the performance of the HD cipher in terms of security and error correction are derived. We show that the proposed HD cipher provides security equivalent to Rijndael cipher against linear and differential cryptanalysis. Experiments based on a four round HD cipher reveal that traditional concatenated systems using the Rijndael cipher followed by Reed Solomon codes require 89% more expansion to match the performance of HD cipher.

[1]  Kaisa Nyberg,et al.  Differentially Uniform Mappings for Cryptography , 1994, EUROCRYPT.

[2]  Joan Daemen,et al.  Cipher and hash function design strategies based on linear and differential cryptanalysis , 1995 .

[3]  Stefan Lucks,et al.  Attacking Seven Rounds of Rijndael under 192-bit and 256-bit Keys , 2000, AES Candidate Conference.

[4]  Vincent Rijmen,et al.  The Design of Rijndael , 2002, Information Security and Cryptography.

[5]  Walter Godoy,et al.  A proposal of a cryptography algorithm with techniques of error correction , 1997, Comput. Commun..

[6]  Thomas A. Berson,et al.  Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack , 1997, CRYPTO.

[7]  Marine Minier,et al.  A Collision Attack on 7 Rounds of Rijndael , 2000, AES Candidate Conference.

[8]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice,Second Edition , 2002 .

[9]  Tzonelih Hwang,et al.  Secret Error-Correcting Codes (SECC) , 1988, CRYPTO.

[10]  H. Feistel Cryptography and Computer Privacy , 1973 .

[11]  Tor Helleseth,et al.  Workshop on the theory and application of cryptographic techniques on Advances in cryptology , 1994 .

[12]  Vincent Rijmen,et al.  The Block Cipher Square , 1997, FSE.

[13]  Mitsuru Matsui,et al.  Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.

[14]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[15]  Vincent Rijmen,et al.  The Wide Trail Design Strategy , 2001, IMACC.

[16]  Eli Biham,et al.  Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer , 1991, CRYPTO.

[17]  D. Chaum,et al.  Di(cid:11)erential Cryptanalysis of the full 16-round DES , 1977 .

[18]  van Hca Henk Tilborg Coding theory at work in cryptology and vice versa , 1998 .

[19]  Israel Bar-David,et al.  Capacity and coding for the Gilbert-Elliot channels , 1989, IEEE Trans. Inf. Theory.

[20]  David A. Wagner,et al.  Integral Cryptanalysis , 2002, FSE.

[21]  Rajarathnam Chandramouli,et al.  Robust encryption for secure image transmission over wireless channels , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[22]  S. Wicker Error Control Systems for Digital Communication and Storage , 1994 .