Abstract
Currently, electronic documents are commonly exchanged between/among government offices in many countries. When a government office would like to transmit a high-security-level-electronic document to another office, the sending end officer needs to encrypt it so as to protect the document from being known to hackers. AES and DES have been commonly and widely invoked to protect documents in recent years. However, the two algorithms have so far faced the threats of Brute-Force cracks. To avoid the threats, in this study, we proposed a new data encryption approach, called the Secure Data Encryption Method (SeDEM for short), in which plaintext and system keys are encrypted by using a sequential-logic style encryption approach which further employs a three-dimensional operation and a feedback encryption mechanism to effectively protect encrypted data from brute-force and cryptanalysis attacks. The feedback encryption mechanism is a feedback process in which each of its calculation iteration generates three internally-used dynamic feedback keys for the next calculation iteration. The purpose is to effectively improve the security level and unpredictability of generated ciphertext. The three-dimensional operation is employed to further increase the computational complexity of the encryption technique so as to enhance the security level of the ciphertext, and difficulty of cracking the keys.
Chapter PDF
Similar content being viewed by others
Keywords
References
Huang, Y.L., Leu, F.Y.: Constructing a Secure Point-to-Point Wireless Environment by Integrating Diffie-Hellman PKDS RSA and Stream Ciphering for Users Known to Each Other. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 2(3), 96–107 (2011)
Lee, S.M., Kim, D.S., Park, J.S.: A Survey and Taxonomy of Lightweight Intrusion Detection Systems. Journal of Internet Services and Information Security 2(1/2), 119–131 (2012)
Pandey, S.K., Barua, R.: Efficient Construction of Identity Based Signcryption Schemes from Identity Based Encryption and Signature Schemes. Journal of Internet Services and Information Security 1(2/3), 161–180 (2011)
Yang, C.H.: Network Security: Theory and Practice. XBOOK MARKETING Co. Ltd. (September 2008)
Hunker, J., Probst, C.W.: Insiders and insider threats—an overview of definitions and mitigation techniques. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 2(1), 4–27 (2011)
Huang, Y.F., Leu, F.Y., Chiu, C.H., Lin, I.L.: Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS. Journal of Universal Computer Science 17(6), 891–911 (2011)
Moore, A.P., Cappelli, D.M., Carony, T.C., Shaw, E., Spooner, D., Trzeciak, R.F.: A preliminary model of insider theft of intellectual property. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 2(1), 28–49 (2011)
Barkan, E., Biham, E.: In How Many Ways Can You Write Rijndael? In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 160–175. Springer, Heidelberg (2002)
Federal Information Processing Standards Publication 197. Announcing the ADVANCED ENCRYPTION STANDARD (AES) (November 26, 2001)
Daemen, J., Rijmen, V.: AES Proposal: Rijndael. In: The First Advanced Encryption Standard Candidate Conference (September 1999)
http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation
Eisenbarth, T., Kumar, S., Uhsadel, L., Paar, C., Poschmann, A.: A Survey of Lightweight-Cryptography Implementations. IEEE Design & Test of Computers, 522–533 (December 2007)
Dworkin, M.: Recommendation for BlockCipher Modes of OperationMethods and Techniques. Natl. Inst. Stand. Technol. Spec. Publ. 800-38A 2001 ED, 66 pages (December 2001)
Mils Electronic, One Time Key Encryption, http://www.mils.com/
Yang, F.Y., Liu, Z.W., Chiu, S.H.: Mobile Banking Payment System. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 2(3), 85–95 (2011)
El-Ramly, S.H., El-Garf, T., Soliman, A.H.: Dynamic Generation of S-boxes in Block Cipher Systems. In: Radio Science Conference, pp. 389–397 (August 2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 IFIP International Federation for Information Processing
About this paper
Cite this paper
Huang, YL., Leu, FY., Dai, CR. (2012). A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional Operation. In: Quirchmayr, G., Basl, J., You, I., Xu, L., Weippl, E. (eds) Multidisciplinary Research and Practice for Information Systems. CD-ARES 2012. Lecture Notes in Computer Science, vol 7465. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32498-7_44
Download citation
DOI: https://doi.org/10.1007/978-3-642-32498-7_44
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32497-0
Online ISBN: 978-3-642-32498-7
eBook Packages: Computer ScienceComputer Science (R0)