CFP last date
20 May 2024
Reseach Article

Matrix based Key Generation to Enhance Key Avalanche in Advanced Encryption Standard

Published on None 2011 by Paul A.J, P. Mythili, K. Paulose Jacob
International Conference on VLSI, Communication & Instrumentation
Foundation of Computer Science USA
ICVCI - Number 2
None 2011
Authors: Paul A.J, P. Mythili, K. Paulose Jacob
c05317fe-1a42-4009-bcda-110bffabb4f9

Paul A.J, P. Mythili, K. Paulose Jacob . Matrix based Key Generation to Enhance Key Avalanche in Advanced Encryption Standard. International Conference on VLSI, Communication & Instrumentation. ICVCI, 2 (None 2011), 31-34.

@article{
author = { Paul A.J, P. Mythili, K. Paulose Jacob },
title = { Matrix based Key Generation to Enhance Key Avalanche in Advanced Encryption Standard },
journal = { International Conference on VLSI, Communication & Instrumentation },
issue_date = { None 2011 },
volume = { ICVCI },
number = { 2 },
month = { None },
year = { 2011 },
issn = 0975-8887,
pages = { 31-34 },
numpages = 4,
url = { /proceedings/icvci/number2/2638-1152/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on VLSI, Communication & Instrumentation
%A Paul A.J
%A P. Mythili
%A K. Paulose Jacob
%T Matrix based Key Generation to Enhance Key Avalanche in Advanced Encryption Standard
%J International Conference on VLSI, Communication & Instrumentation
%@ 0975-8887
%V ICVCI
%N 2
%P 31-34
%D 2011
%I International Journal of Computer Applications
Abstract

In symmetric block ciphers, substitution and diffusion operations are performed in multiple rounds using sub-keys generated from a key generation procedure called key schedule. The key schedule plays a very important role in deciding the security of block ciphers. In this paper we propose a complex key generation procedure, based on matrix manipulations, which could be introduced in symmetric ciphers. The proposed key generation procedure offers two advantages. First, the procedure is simple to implement and has complexity in determining the sub-keys through crypt analysis. Secondly, the procedure produces a strong avalanche effect making many bits in the output block of a cipher to undergo changes with one bit change in the secret key. As a case study, matrix based key generation procedure has been introduced in Advanced Encryption Standard (AES) by replacing the existing key schedule of AES. The key avalanche and differential key propagation produced in AES have been observed. The paper describes the matrix based key generation procedure and the enhanced key avalanche and differential key propagation produced in AES. It has been shown that, the key avalanche effect and differential key propagation characteristics of AES have improved by replacing the AES key schedule with the Matrix based key generation procedure.

References
  1. William Stallings, “Network Security Essentials (Applications and Standards), ” Pearson Education, pp. 2-80, (2004).
  2. Charles P. Pfleeger, Shari Lawrence Pfleeger, “Security in computing,” Pearson Education, pp. 66-120, (2004).
  3. Jose J. Amador, Robert W. Green, “Symmetric-Key Block Ciphers for Image and Text Cryptography,” International Journal of Imaging System Technology, Vol.15 – pp. 178- 188, (2005).
  4. Dragos Trinca, “Sequential and Parallel Cascaded Convolution Encryption with Local Propagation: Toward future Directions in Cryptography,” Proceedings of The third International Conference on Information Technology -New Generations. (ITNG’06), 0-7695-2497- 4 / 2006, IEEE Computer Society, (2006).
  5. Data Encryption Standard : http://csrc.nist.gov/publications/fips/fips46-3/fips- 46-3.pdf
  6. Advanced Encryption Standard: http://csrc.nist.gov/publications/fips/fips197/ fips- 97.pdf
  7. Escrowed Encryption Standard: http://csrc.nist.gov/publications/fips/fips1185/ fips-185.txt
  8. Krishnamurthy G.N, Ramaswamy V., Leela G.H, Ashalatha M.E, “Performance enhancement of Blowfish and CAST-128 algorithms and Security analysis of improved Blowfish algorithm using Avalanche effect,” International Journal of Computer Science and Network Security, Vol.8, No. 3, March 2008, pp. 244-250.
  9. Paul A.J., Varghese Paul, P. Mythili, “ Matrix Array Symmetric Key Encryption,” Journal of Computer Society of India, Vol. 37, Issue No. 1, January – March 2007, pp. 48-53.
  10. Paul A.J., Varghese Paul, P. Mythili, “ A Fast And Secure Encryption Algorithm for Message Communication,” IETECH International Journal of Communication Techniques, Vol. 2, No. 3, 2008, pp 104-109.
  11. Paul A.J., Varghese Paul, P. Mythili, “Fast Symmetric Cryptography using Key and Data based Masking operations,” International- Journal of Computational Intelligence - Research & applications, Vol 3, Number 1, January – June 2009, pp. 5-10.
Index Terms

Computer Science
Information Sciences

Keywords

Ciphertext Encryption Plaintext Key avalanche Secret key Sub-key