CODING - Stream Cipher Methods by Varying Components during Ciphering Data

نویسنده

  • Jürgen Müller
چکیده

Kernel of the symmetric block ciphering methods presented here is the coupling of XOR operations and of invertible substitution tables S with all possible 256**t byte groups (with t=1, 2, 3, ... Bytes, fixed at the beginning) being derived from keys: K(block) := S(S(block) ⊗ Eo) ⊗ Eu with-Eo upper and Eu lower triangular (byte-group-)matrix with (byte-block-length/t)**2 values, value 1 at all non-zero positions,-⊕ the byte-group-wise addition without carry ('xor'; 'not xor' is possible too),-⊗ the (vector) multiplication which belongs to ⊕. Variable block lengths (v*t or (mod t)>0) are possible. This kernel can be applied n-times: Kn(block) := K(...K(block)...) with n K-operations, in which n can be variable. Because XOR operations and Stables only operate in a useful manner if 'block' is not to "homogeneous" and for safety, two further components are determined from keys-parameters of 2 pseudo random processes,-operation key used at beginning and at end to get a ciphered block: cblock := S(ZZ2 ⊕ S(OpE ⊕ S(Kn(OpA ⊕ S(ZZ1 ⊕ S(block)))))) with-ZZ1 and ZZ2 are the bytes of the 1. and 2. pseudo random number process in block length,-OpA and OpE is the (1./front and 2./back part of the or multiple of the) operation key. An initial key is first expanded to t*256**t bytes (all further keys have this size too) and can be modified so the result key does not statistically differ from a random key. Using an invertible Stable , the value (modulo n) of only as much consecutive bits of a key as to represent the number n-1 is determined to shift the last n Stable elements cyclically in accordance with this value, n=2 to 256**t. So all such 256**t! tables can be generated by the top bits of all possible keys and have length of t*256**t bytes. The byte-group-value +1 at a position of a Stable determines the byte-group in the key from which up 2*7 bytes are used to initialize two floating point numbers (IEEE 754) for a pseudo random process. Floating point numbers are initialized again if a process will be cyclic. Idea is, to modify (operation) keys similar to data blocks to generate and use more or less continual new Stables , new pseudo random processes, and new operation keys during ciphering data. Inspections show that in spite of knowledge of 2 of the 3 components Stable , pseudo random parameters, and operation key as well as the knowledge of …

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm

Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...

متن کامل

A Stream Ciphering Approach Based on the Wire-Tap Channel Coding

8th Central European Conference on Cryptography 2008 1 Let’s call ECC-box a coponent which encodes the plaintext in order to provide correction of the random errors. Note that in the proposing stream cipher ECC-box encodes the plaintext so that it can be recovered correctly after corruption by the errors introduced in the ciphertext deliberately. Block scheme of the novel stream cipher family i...

متن کامل

A Selective Encryption for Heterogenous Color JPEG Images Based on VLC and AES Stream Cipher

Nowadays, the most important engine to provide confidentiality is encryption. Therefore, the classical and modern ciphers are not suitable for huge quantity of data in real-time environment. Selective encryption (SE) is an approach to encode only the most important portion of the data in order to provide a proportional privacy and to reduce computational requirements. The objective of our work ...

متن کامل

A Stream Ciphering Method using a Chaotic System

433 Abstract— In this paper, we presented a ciphering method whose target data is any kind of digital bit-stream. It uses a chaotic system as the main encrypting tool, MISR (Multi-Input Signature Register), and shift-and-rotation function, all of which are exclusive-ORed with the plaintext. Also, it incorporates a cipher text feedback mode such that part of the previously ciphered data is fed b...

متن کامل

A New Ultrafast Stream Cipher Design: COS Ciphers

This paper presents a new stream cipher family whose output bits are produced by blocks. We particularly focus on the member of this family producing 128-bit blocks with a 256-bit key. The design is based on a new technique called crossing over which allows to vectorize stream ciphering by using nonlinear shift registers. These algorithms offer a very high cryptographic security and much higher...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2013  شماره 

صفحات  -

تاریخ انتشار 2013