Abstract
In recent years, parallel computing capabilities have been more powerful than before. Consequently some block cipher standards, such as DES used to protect important electronic messages, have been cracked in the past years. Also due to the rapid development of hardware processing speeds, 3DES and AES may someday be solved by brute-force attacks. Basically, the common characteristics of these block cipher standards are that each time, when a standard is invoked, the same parent key is used to generate subkeys. The subkeys are then utilized in the standard’s encryption rounds to encrypt data. In fact, the variability of the key values is quite limited. Generally, producing random parameters to encrypt data is an effective method to improve the security of ciphertext. But how to ensure the security level of using and delivering these random parameters and how to avoid information leakage have been a challenge. So in this paper, we propose a novel random parameter protection approach, called the Initialization Cipher Block Method(ICBM for short), which protects random parameters by using a two-dimensional operation and employs random parameters to change the value of a fixed parent key for block ciphering, thus lowering the security risk of a block cipher algorithm. Security analysis demonstrates that the ICBM effectively improve the security level of a protected system. Of course, this also safely protect our homeland, particularly when it is applied to our governmental document delivery systems.
Chapter PDF
Similar content being viewed by others
References
FIPS Publication 46-3, Data Encryption Standard (DES), U.S. DoC/NIST (October 25, 1999)
National Institute of Standards and Technology, NIST Special Publication 800-67, Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher, Reversion 1.1 (January 2012)
FIPS Publication 197, Advanced Encryption Standard (AES), U.S. DoC/NIST (November 26, 2001)
NIST Special Publication 800-57 Recommendation for Key Management — Part 1: General (Revised) (March 2007)
Wei, K.C., Huang, Y.L., Leu, F.Y.: A Secure Communication over Wireless Environments by Using a Data Connection Core. Computers and Mathematics with Applications (in press)
Huang, Y.-L., Leu, F.-Y., Dai, C.-R.: A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional Operation. In: Quirchmayr, G., Basl, J., You, I., Xu, L., Weippl, E. (eds.) CD-ARES 2012. LNCS, vol. 7465, pp. 578–592. Springer, Heidelberg (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 IFIP International Federation for Information Processing
About this paper
Cite this paper
Huang, YL., Leu, FY., You, I., Yang, JH. (2014). Building an Initialization Cipher Block with Two-Dimensional Operation and Random Parameters. In: Teufel, S., Min, T.A., You, I., Weippl, E. (eds) Availability, Reliability, and Security in Information Systems. CD-ARES 2014. Lecture Notes in Computer Science, vol 8708. Springer, Cham. https://doi.org/10.1007/978-3-319-10975-6_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-10975-6_12
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-10974-9
Online ISBN: 978-3-319-10975-6
eBook Packages: Computer ScienceComputer Science (R0)