Alternative N-bit Key Data Encryption for Block Ciphers
ResumoPost-encryption patterns are cribs that can be used by adversaries to unlock the encryption key both in symmetric or asymmetric cryptography, compromising security. Different methods to mitigate the problem, with their advantages and disadvantages, can be found in the literature, including one-time pad encryption, code-based cryptography and cipher block chaining. This work presents an alternative technique to generate an n-bit, n-block and key cipher that can be derived from reasonable short length key. The proposed technique is able to mitigate post-encryption patterns. Experimental results asserting the capabilities of the proposed cipher techniques are presented and discussed in the text.
Recommendation for key management, Part 1: General (Revised). Technical report, Gaithersburg, MD, United States.
Bellovin, S. M. (2011). Frank miller: Inventor of the one-time pad. Cryptologia, 35(3):203–222. DOI: 10.1080/01611194.2011.583711.
Dierks, T. and Rescorla, E. (2006). The transport layer security (TLS) protocol version 1.1. RFC, 4346:1–87. Network Working Group, RFC4346.
Ehrsam, W. F., Meyer, C. H., Smith, J. L., and Tuchman, W. L. (1978). Message verification and transmission error detection by block chaining. US Patent 4,074,066.
FIPS (1977). Data encryption standard (DES). Federal Information Processing Standards. Publication 46-3. FIPS 46.
FIPS (1981). Des modes of operation. Federal Information Processing Standards. Publication 81. FIPS 81.
NSA (2009). The Case for Elliptic Curve Cryptography. U.S. National Security Agency. Archived from the original on 2009-01-17.
NSA (2016). Commercial National Security Algorithm Suite and Quantum Computing FAQ. U.S. National Security Agency.
Rijmeanants, D. (2012). The complete guide to secure communications with the one time pad cipher. Cipher Machines and Cryptology. Available at http://users.telenet.be/d.rijmenants.
Sendrier, N. (2017). Code-based cryptography: State of the art and perspectives. IEEE Security and Privacy, 15(4):44–50. DOI: 10.1109/MSP.2017.3151345.
Tao, C., Diene, A., Tang, S., and Ding, J. (2013). Simple matrix scheme for encryption. In Gaborit, P., editor, Post-Quantum Cryptography, pages 231–242, Berlin, Heidelberg. Springer Berlin Heidelberg.