AVK based Cryptosystem and Recent Directions Towards Cryptanalysis (original) (raw)
Related papers
This paper presents enhanced model of security of symmetric key based cryptosystem[1]. The enhancement of model by variable keys and key exchange using parameters only approach is also presented. The issue of fixing up the minimum length of key for AVK is also a big challenge in AVK model. Selection of shorter key length leads to vulnerability/compromise of system, on the other side, larger then optimum key size would involve unnecessary overheads and wastage of resources[2]. Further, ensuring high protection against malicious attack, is achieved through IDS software tools, that attempts to detect and prevent the system from malicious network users. Apart from these tools, various network security applications using pattern mining to extract the threat from cipher log. Faster and more efficient pattern matching algorithm to overcome the performance issue is demonstrated in[3], parameterized model of automatic variable key. Presented parameters only exchanged instead of key, has been analyzed using association rule discovery from hacker's perspective. This paper applies apriori method to investigate association rule among parameters used for generation of key and prediction of future key in the cryptosystem based on parameter only communication for AVK model[11]. In other words, the paper attempts to answer, How much the method is secure against association rule for future parameter prediction?
Cryptic Mining for Automatic Variable Key Based Cryptosystem
This paper presents evolution of Automatic variable key cryptosystem with study and analysis of state of symmetric cryptosystem. It presents framework of AVK model and extension by parameterized approach. The evaluation of cryptosystem from perspective of cryptanalyst has been presented. The paper opens direction of “Cryptic Mining “discipline. The AVK approach finds application in low power secure device communication, which is most desirable feature of Internet of Things.
Cryptic Mining for AVK Based Cryptosystem and Client Side Encryption Perspective
This work presents parametric versions of symmetric cryptic algorithms that emphasises on generation and usage of key based on parameter only. The key construction process has been extended for generation of alphanumeric keys apart from numeric one with exploiting domain of parameter selection from personnel information logs. The hypothesis of parametric but variable key for cryptic model (usable for Automatic Variable Key) tested with the freedom of user for the parameter selection and variation in the parameters according to comfort instead of using series, recurrence relation or location information [8, 21]. The paper investigates parametric model in the light of Association Rule Mining for such cryptosystem [15]. Useful inferences and results from testing results helps in auditing of AVK based cryptic algorithm and identifies power of using a large number of parameters for secure information exchange.
Markov Analysis of AVK Approach of Symmetric Key Based Cryptosystem
In Symmetric Key Cryptography domain, Automatic Variable Key (AVK) approach is in inception phase because of unavailability of reversible XOR like operators. Fibonacci-Q matrix has emerged as an alternative solution for secure transmission with varying key for different sessions [3, 10]. This paper attempts to analyze symmetric key cryptography scheme based on AVK approach. Due to key variability nature, the AVK approach is assumed to be more powerful, efficient and optimal but its analysis from hackers' point of view is demonstrated in this paper. This paper also assumes various situations under which mining of future keys can be achieved. The paper also discusses concept of Key variability with less probability of extracted result under various scenario with the different degree of difficulty in key mining.
Generalized Parametric Model for AVK-Based Cryptosystem
Networking Communication and Data Knowledge Engineering, 2017
This work presents the enhancement of security of automatic variable key (AVK)-based cryptosystem by exchanging some parameters instead of entire keys between the communicating parties [1-4]. Now, these parameters will be used to generate required keys at the receiver end. The work presents a framework for above-specified mechanism. Moreover, the model has been demonstrated with parameterized scheme and production issues in AVK approach (from the different user's perspective including hacker).
A Survey Report on Various Cryptanalysis Techniques
2013
This paper mainly focuses on various types of attacks on symmetric cipher & asymmetric cipher .In this paper we tried to describe the existing cryptanalytic attacks on various ciphers and countermeasures to these attacks have been suggested on the basis of information available to attacker ,computational time requirements and memory requirements etc . In order to develop a new secure cipher, it is very necessary that these attacks should be taken into consideration during development and countermeasures of these attacks should be applied in the design, so that the new design is not vulnerable to these attacks. It will also facilitate the security analysis of the existing ciphers and provide an opportunity to understand the requirements for developing a secure and efficient cipher design. This paper surveys about various cryptanalysis techniques for image encryption schemes ,public key cryptosystems ,various encryption standards such as AES ,DES,RSA etc and then tries to suggest some...
Frequent pattern mining for parameterised automatic variable key-based cryptosystems
International Journal of Business Intelligence and Data Mining, 2018
Huge amount of information is exchanged electronically in most enterprises and organisations. In particular, in all financial and e-business set ups the amount of data stored or exchanged is growing enormously over public network among variety of computing devices. Securing this gargantuan sized input is challenging. This paper provides a framework for securing information exchange using parametric approaches with AVK approach and investigating strength of this cryptosystem using mining algorithms on symmetric key-based cryptosystem. This work demonstrates association rule application as one of the component of cryptic mining system used to process the encrypted data for extracting use full patterns and association. The degree of identified patterns may be use full to rank the degree of safety and class of cryptic algorithm, during auditing of security algorithms.
Towards Parameterized Shared Key for AVK Approach
" Key " plays a vital role in every symmetric key cryptosystem. The obvious way of enhancing security of any cryptosystem is to keep the key as large as possible. But it may not be suitable for low power devices since higher computation will be done for longer keys and that will increase the power requirement which decreases the device's performance. In order to resolve the former specified problem an alternative approach can be used in which the length of key is fixed and its value varies in every session. This is Time Variant Key approach or Automatic Variable Key (AVK) approach. The Security of AVK based cryptosystem is enhanced by exchanging some parameters instead of keys between the communicating parties, then these parameters will be used to generate required keys at the receiver end. This chapter presents implementation of the above specified Mechanism. A model has been demonstrated with pa-rameterized scheme and issues in AVK approach. Further, it has been analyzed from different users' perspectives. This chapter also highlights the benefits of AVK model to ensure two levels of security with characterization of methods for AVK and Estimation of key computation based on parameters only. The characteristic components of recent styles of key design with consideration of key size, life time of key and breaking threshold has also been pointed out. These characteristics are essential in the design of efficient symmetric key cryptosystem. The novel approach of AVK based cryptosystem is suitable for low power devices and useful for exchanging very large objects or files. This scheme has been demonstrated with Fibonacci-Q matrix and sparse matrix based diffused key information exchange procedures. These models have been further tested from perspective of hackers and cryptanalyst, to exploit any weakness with fixed size dynamic keys.
A Brief Review on Methodology of Cryptanalysis
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2019
Cryptanalysis comes into deferent forms in order to support that rigorous analysis of the structure cryptographic primitive to evaluate and verify its claimed security margins. This analysis will follow the attack models represented previously in order to exploit possible weakness in the primitive. Thus, achieving the associated attack goals which will vary from a distinguishing attack to a total break that is de?ned based on the security margins or claims of the primitive under study. For example, for a hash function, total break constitutes ?nding a collision or obtaining the message from the hash value. While in block ciphers it revolves around recovering the secret key. When it comes to the claimed security margins, the design approaches will follow certain security models as in provable security or practical security or a mixture of both. The role of cryptanalyst is to subject these primitives to di?erent existing categories of cryptanalysis approaches and tailor new ones that will push the design’s security margins if possible to new limits where these attacks are not applicable any more This chapter will introduce the prominent methods of cryptanalysis that utilize certain behavior in the cipher structure. Such behavior disturbs the assumed randomness of the output or the cipher text. This Paper will explore the basic de?nitions of prominent cryptanalysis methods that targets the speci?c structure of a cipher namely di?erential and linear cryptanalysis and their di?erent variants. It will also discuss other potential crytpanalytic methods that are usually used in symmetric-key ciphers analysis especially block ciphers.