KBC: Multiple Key Generation using Key Block Chaining

被引:4
作者
Prajapati, Payal [1 ]
Chaudhari, Kinjal [1 ]
机构
[1] Nirma Univ, Inst Technol, Dept Comp Sci & Engn, Ahmadabad 382481, Gujarat, India
来源
INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE | 2020年 / 167卷
关键词
Advanced Encryption Standard; Cipher Block Chaining; Key Generation; Key Block Chaining; Message Authentication Code;
D O I
10.1016/j.procs.2020.03.224
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cryptography is an important aspect of securing communications, however, the encryption scheme may be known to the attacker(s). Hence, the key can be rewarded as a crucial part of any cryptographic algorithm. With the symmetric key, researchers have developed chaining concepts where the output of one operation becomes an input to the next one. Such concept of modes of operation (Cipher Block Chaining) is integrated in this article to generate multiple key blocks. The generated keys can be provided to an individual block of plaintext for any encryption technique as per the requirements. The proposed Key Block Chaining (KBC) approach can also be referred to as a key derivation approach. The basic concepts of Advanced Encryption Standard and Message Authentication Code have also been incorporated in the proposed model to introduce randomness, and thereby, ensuring security as well as robustness. To assess the randomness of the sequence of generated keys, KBC is implemented and tested using the National Institute of Standards and Technology statistical test suite and reasonable randomness has been successfully achieved. Possible variations and key points of the proposed approach along with statistical analysis and significance of our work have been discussed. (C) 2020 The Authors. Published by Elsevier B.V.
引用
收藏
页码:1960 / 1969
页数:10
相关论文
共 23 条
[1]  
[Anonymous], 2001, NIST SPECIAL PUBLICA
[2]  
[Anonymous], 1997, HMAC KEYED HASHING M, DOI DOI 10.17487/RFC2104
[3]  
[Anonymous], 2010, NIST SPECIAL PUBLICA
[4]  
Barker E., 2012, NIST SPECIAL PUBLICA, V800, P133
[5]  
Black J, 2000, LECT NOTES COMPUT SC, V1880, P197
[6]  
Bouillaguet C, 2011, LECT NOTES COMPUT SC, V6841, P169, DOI 10.1007/978-3-642-22792-9_10
[7]  
Chen L., 2008, Recommendation for Key Derivation Using Pseudorandom Functions
[8]  
Chuang CC, 2013, I SYMP CONSUM ELECTR, P125
[9]  
Daemen J., 2013, DESIGN RIJNDAEL AES
[10]  
DeBellis RS, 2000, USPatent, Patent No. [6,044,388, 6044388]