A multi-shape hybrid symmetric encryption algorithm to thwart attacks based on the knowledge of the used cryptographic suite

Abstract This research paper introduces a novel symmetric encryption algorithm that provides the confidentiality security service without leaking enough information about the exact encryption algorithm or other cryptographic parameters to anyone except the legitimate receiver. This is achieved by utilizing a set of sound existing symmetric encryption algorithms, namely, the Advanced Encryption Standard,MARS,RC6, Serpent and Twofish. The identity of the algorithm used to secure the current message, along with other cryptographic parameters (e.g. mode of operation, key length), are hidden from anyone except the legitimate receiver. These parameters are shared securely between communicating parties by utilizing some of the symmetric key bits. The cipher suite in addition to the encryption key, changes systematically and securely with every new message, leaving the opponent with no enough information to launch any effective attack. The algorithm performance is tested, and the overall performance is close to the performance of conventional encryption with a delay of about 16.52 CPU Cycles per message. From a security point of view, the possibility of cryptanalysis is diminished significantly, as no party except communicating parties has any knowledge of the cryptographic parameters in use.

[1]  Tyler Moore,et al.  Measuring the Cost of Cybercrime , 2012, WEIS.

[2]  O. M. Lyashuk Highly efficient method of data protection based on multilayer hybrid encryption , 2014 .

[3]  Zhongpeng Wang,et al.  A Chaos-Based Encryption Scheme for DCT Precoded OFDM-Based Visible Light Communication Systems , 2016, J. Electr. Comput. Eng..

[4]  Iqtadar Hussain,et al.  A noise resistant symmetric key cryptosystem based on S8 S-boxes and chaotic maps , 2018, The European Physical Journal Plus.

[5]  Rossouw von Solms,et al.  From information security to cyber security , 2013, Comput. Secur..

[6]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[7]  Hao He,et al.  Physical layer signal encryption using digital chaos in OFDM-PON , 2015, 2015 10th International Conference on Information, Communications and Signal Processing (ICICS).

[8]  Iqtadar Hussain,et al.  An algorithm for the construction of substitution box for block ciphers based on projective general linear group , 2017 .

[9]  Keting Jia,et al.  Improved Single-Key Attacks on 9-Round AES-192/256 , 2014, FSE.

[10]  Joo Yeon Cho,et al.  Linear Cryptanalysis of Reduced-Round PRESENT , 2010, CT-RSA.

[11]  Chenhui Jin,et al.  Meet-in-the-middle attacks on 10-round AES-256 , 2016, Des. Codes Cryptogr..

[12]  Kaisa Nyberg,et al.  A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent , 2008, ICISC.

[13]  Dengguo Feng,et al.  Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing , 2005, IACR Cryptol. ePrint Arch..

[14]  Jérémy Jean,et al.  Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting , 2013, IACR Cryptol. ePrint Arch..

[15]  Harpreet Singh,et al.  Enhancing AES using Novel Block Key Generation Algorithm and Key Dependent S-boxes , 2016 .

[16]  Bruce Schneier,et al.  MARS Attacks! Preliminary Cryptanalysis of Reduced-Round MARS Variants , 2000, AES Candidate Conference.

[17]  Alex Biryukov,et al.  Related-Key Cryptanalysis of the Full AES-192 and AES-256 , 2009, ASIACRYPT.

[18]  Andrey Bogdanov,et al.  Biclique Cryptanalysis of the Full AES , 2011, ASIACRYPT.

[19]  Tobias Kretschmer,et al.  ICT and productivity: conclusions from the empirical literature , 2013, Inf. Econ. Policy.

[20]  Abdelrahman Altigani,et al.  Analyzing the Performance of the Advanced Encryption Standard Block Cipher Modes of Operation: Highlighting the National Institute of Standards and Technology Recommendations , 2016 .

[21]  Christophe Clavier,et al.  Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacks , 2014, Cryptography and Communications.

[22]  Kaisa Nyberg,et al.  Multidimensional Linear Cryptanalysis of Reduced Round Serpent , 2008, ACISP.

[23]  Iqtadar Hussain,et al.  Construction of chaotic quantum magnets and matrix Lorenz systems S-boxes and their applications , 2018, Chinese Journal of Physics.

[24]  Ing-Jer Huang,et al.  NCPA: A Scheduling Algorithm for Multi-cipher and Multi-mode Reconfigurable Cryptosystem , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[25]  Yiran Chen,et al.  A novel chaos-based image encryption algorithm using DNA sequence operations , 2017 .

[26]  Sattar Mirzakuchaki,et al.  Breaking a novel image encryption scheme based on an improper fractional order chaotic system , 2015, Multimedia Tools and Applications.