Symmetric Cipher

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 324 Experts worldwide ranked by ideXlab platform

Dmitry Khovratovich - One of the best experts on this subject based on the ideXlab platform.

Alex Biryukov - One of the best experts on this subject based on the ideXlab platform.

Charles Bouillaguet - One of the best experts on this subject based on the ideXlab platform.

Raphaël Couturier - One of the best experts on this subject based on the ideXlab platform.

  • Overview of Efficient Symmetric Cryptography: Dynamic vs Static Approaches
    2020
    Co-Authors: Hassan Noura, Ali Chehab, Raphaël Couturier
    Abstract:

    Cryptography is the central component of a large number of security solutions. However, most of the existing algorithms do not take into consideration the structure of data, its size, the real-time constraints (latency), and the resource constraints (energy, memory, and CPU). Recently, to address these challenges, different solutions were proposed by optimizing the existing ones or by designing new lightweight algorithms. Employing a static structure requires the iteration of a round function for a large number of rounds r, which consequently leads to an increase in the latency and required resources. Therefore, in this paper, we recommend the design of new algorithms with a “dynamic structure” for Symmetric key encryption towards reducing r, which in turn reduces the required latency and resources. Equally important, the substitution and diffusion primitives should become dynamic and related to a secret key. Furthermore, we present the advantages and limitations of the static and dynamic Symmetric Cipher approaches. The objective of this paper is to provide guidelines for the design of future (dynamic) cryptographic algorithms and highlight future research challenges, issues and directions.

  • TRESC: Towards redesigning existing Symmetric Ciphers
    Microprocessors and Microsystems, 2020
    Co-Authors: Hassan N. Noura, Ola Salman, Nesrine Kaaniche, Nicolas Sklavos, Ali Chehab, Raphaël Couturier
    Abstract:

    Abstract Recently, the security of existing Symmetric cryptographic algorithms and protocols has been threatened by new performance challenges and vulnerabilities. In this paper, we propose a dynamic key-dependent approach, ”TRESC”, to make existing Symmetric Ciphers more efficient and robust. This can be done by using dynamic substitution and permutation primitives to reduce the number of rounds while providing better resistance against cryptanalysis and implementation attacks. In this paper, the Key Setup Algorithm (KSA) of Rivest Cipher 4 (RC4) and its modified variants are applied for the construction of these dynamic key-dependent substitution and permutation primitives. The selection of the RC4-KSA is due to its lightweight implementation since it requires simple permutation operation with minimal overhead. The proposed dynamic cryptographic solution can be integrated in any existing Symmetric Cipher such as Advanced Encryption Standard (AES), SIMON and SPECK. The security and performance analysis show the robustness and effectiveness of the proposed solution, which strikes a good balance between the required security level and system performance.

  • Efficient & secure Cipher scheme with dynamic key-dependent mode of operation
    Signal Processing: Image Communication, 2019
    Co-Authors: Hassan Noura, Ali Chehab, Raphaël Couturier
    Abstract:

    Security attacks are constantly on the rise leading to drastic consequences. Several security services are required more than ever to prevent both passive and active attacks such as Data Confidentiality (DC). A DC security service is typically based on a strong Symmetric Cipher algorithm. However, some of today’s applications, such as real-time applications and those running on constrained devices, require efficient lightweight Cipher schemes that can achieve a good balance between the security level and system performance. Recently, a set of lightweight cryptographic algorithms has been proposed to that end, which is based on a dynamic key approach. The dynamic structure enables the reduction of the number of rounds to the minimum possible value of just one or two rounds, which minimizes the computational overhead without degrading the security level. This paper follows the dynamic key-dependent Cipher logic and proposes a new flexible lightweight technique with or without the reliance on the chaining mode of operation. Furthermore, the dynamic key changes for each input message, which leads to different Cipher primitives such as substitution and permutation tables, in addition to round keys. Also, the proposed mode of operation is based on the dynamic key approach whereby blocks are selected and mixed according to a dynamic permutation table. Accordingly, different plaintext messages are encrypted differently while preserving the avalanche effect. Finally, we conduct security and performance analysis to validate the efficiency and robustness of the proposed Cipher scheme as compared to traditional Ciphers and to the recently proposed dynamic key-dependent Ciphers.

M Arvandi - One of the best experts on this subject based on the ideXlab platform.

  • chosen plaintext attack against neural network based Symmetric Cipher
    International Joint Conference on Neural Network, 2007
    Co-Authors: M Arvandi, Alireza Sadeghian
    Abstract:

    In this paper the security of neural network-based Symmetric Ciphers (M. Arvandi et al., 2006) is analyzed. The vulnerability of such Ciphers against chosen plaintext attacks is studied and a possible attack is mathematically presented.

  • Wireless Web Security Using a Neural Network-Based Cipher
    Web Services Security and E-Business, 2007
    Co-Authors: Isaac Woungang, Alireza Sadeghian, Sudip Misra, M Arvandi
    Abstract:

    The increasingly important role of security for wireless Web services environments has opened an array of challenging problems centered on new methods and tools to improve existing data encryption and authentication techniques. Real-time recurrent neural networks offer an attractive approach to tackling such problems because of the high encryption capability provided by the structural hidden layers of such networks. In this chapter, a novel neural network-based Symmetric Cipher is proposed. This Cipher releases the constraint on the length of the secret key to provide the data integrity and authentication services that can be used for securing wireless Web services communication. The proposed Symmetric Cipher design is robust in resisting different cryptanalysis attacks. Simulation results are presented to validate its effectiveness.

  • Symmetric Cipher design using recurrent neural networks
    International Joint Conference on Neural Network, 2006
    Co-Authors: M Arvandi, Alireza Sadeghian, William Melek, Isaac Woungang
    Abstract:

    In this paper, a neural network-based Symmetric Cipher design methodology is proposed to provide high performance data encryption. The proposed approach is a novel attempt to apply the parallel processing capability of neural networks for cryptography purposes. By incorporating neural networks approach, the proposed Cipher releases the constraint on the length of the secret key. The proposed Cipher is robust in resisting different cryptanalysis attacks and provides efficient data integrity and authentication services. The design of the Symmetric Cipher is presented and its security is analyzed. Simulation results are presented to validate the effectiveness of the proposed Cipher design.

  • IJCNN - Symmetric Cipher Design Using Recurrent Neural Networks
    The 2006 IEEE International Joint Conference on Neural Network Proceedings, 2006
    Co-Authors: M Arvandi, Alireza Sadeghian, William Melek, Isaac Woungang
    Abstract:

    In this paper, a neural network-based Symmetric Cipher design methodology is proposed to provide high performance data encryption. The proposed approach is a novel attempt to apply the parallel processing capability of neural networks for cryptography purposes. By incorporating neural networks approach, the proposed Cipher releases the constraint on the length of the secret key. The proposed Cipher is robust in resisting different cryptanalysis attacks and provides efficient data integrity and authentication services. The design of the Symmetric Cipher is presented and its security is analyzed. Simulation results are presented to validate the effectiveness of the proposed Cipher design.