Key generator is part of the stream cipher system that is responsible for generating a long random sequence of binary bits key that used in ciphering and deciphering processes. Therefore, key generator is the heart of the stream cipher system. A system with traditional key generating techniques such as using the feedback shift register is vulnerable to cypher attacks which render it to be ineffective and insecure. A suggested novel method to overcome this problem is to use a Random Forest-Data Mining (RF-DM) algorithm. It incorporates using new types of linear and nonlinear functions to mix the plain text with the key in the encryption process and the cipher text with the reverse key in the decryption process. The method is successful in satisfying the secrecy goal of the stream cipher system because it uses two types of dual randomization to baffle the attacker or cryptanalysist. By mathematical logic and prove by experiments, we generate the key successfully by encrypting messages of different sizes . This proves the ablity to generated the unique key for each message based on its length without repeating the key in most cases. In addition, by combining the use of the random forest data mining technique as the randomizating principle in the ciperhing process makes it exteremely difficult for any attacker because the attacker does not have access or understanding of the not only the technique used but also the process to decipher. The result from our experiment shows that the longer the number of the message size, the longer is the length of the generated key, which determines its strength and hence, its complexity to break by brute force.
[1]
David C. Yen,et al.
Data mining techniques for customer relationship management
,
2002
.
[2]
Ian H. Witten,et al.
Data mining: practical machine learning tools and techniques, 3rd Edition
,
1999
.
[3]
Samaher Hussein Ali.
A New Trend of Knowledge Discovery Toward Intelligent Data Analysis
,
2013
.
[4]
Andreas Klein.
Stream Ciphers
,
2013
.
[5]
David S. Siroky.
Navigating Random Forests and related advances in algorithmic modeling
,
2009
.
[6]
Sukree Sinthupinyo,et al.
Integration of Rules from a Random Forest
,
2022
.
[7]
Fred Piper,et al.
Stream Ciphers
,
1982,
EUROCRYPT.
[8]
Daniel T. Larose,et al.
Discovering Knowledge in Data: An Introduction to Data Mining
,
2005
.
[9]
S. H. Ali,et al.
Miner for OACCR: Case of medical data analysis in knowledge discovery
,
2012,
2012 6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT).
[10]
Mohd Aizaini Maarof,et al.
An Efficient Stream Cipher Algorithm for Data Encryption
,
2011
.
[11]
Jacques Patarin,et al.
QUAD: A multivariate stream cipher with provable security
,
2009,
J. Symb. Comput..
[12]
Jiebo Luo,et al.
Data Mining. Multimedia, Soft Computing, and Bioinformatics
,
2005,
IEEE Transactions on Neural Networks.