We found a match
Your institution may have access to this item. Find your institution then sign in to continue.
- Title
Unprecedented Security Analysis Results for a Novel Key Expansion Algorithm Based on Protein Sequences, Dynamic Mealy Machine, and 3D Logistic Map.
- Authors
Kadhim, Radhwan Jawad; Khafaji, Hussein K.
- Abstract
The key expansion algorithm is an important part of any symmetric block cipher system since its effectiveness directly impacts the security of the entire block cipher; if it is not strong enough, the whole cryptosystem could be broken. Therefore, the round keys must be generated in a very secure way so that they cannot be attacked at all. Despite its great importance, cryptographic algorithm designers were not as interested in creating a secure round keys generation algorithm as they were in encryption itself. In this regard, designing a novel, simple, and flexible key expansion algorithm that generates round keys with secure characteristics is the aim of this research. The proposed Key Expansion algorithm is based on Dynamic Mealy Machine, 3D Logistic Map, and Protein Sequence (KE-DMM3DLMPS). The strength of the proposed KE-DMM3DLMPS algorithm is tested using flexibility, the NIST SP800-22 randomness test suite, histogram analysis, key space analysis, correlation coefficient, hamming distance, number of bit change rate, initial key sensitivity, confusion and diffusion, and differential attack. In comparison to some existing algorithms, experimental results showed that the generated round keys by the proposed KEDMM3DLMPS algorithm passed all the NIST tests with higher randomness, a uniform and ideal distribution of the amino acids present in each round key, and a higher key space of up to 20 x 2471. Furthermore, the KE-DMM3DLMPS avoids the linear relationship between the master secret key and the generated round keys and is capable of effectively blocking differential attacks. The proposed algorithm successfully adheres to key cryptographic principles such as irreversibility, independence, the strict avalanche effect, confusion, and diffusion. Through comprehensive testing and comparisons, the derived conclusion asserts that our algorithm stands as an efficient and secure solution. Its applicability extends to any symmetric block cryptosystem, with the primary goal of enhancing encryption and bolstering security.
- Subjects
NATIONAL Institute of Standards &; Technology (U.S.); AMINO acid sequence; BLOCK ciphers; HAMMING distance; BIT rate; ALGORITHMS; AMINO acids
- Publication
International Journal of Intelligent Engineering & Systems, 2024, Vol 17, Issue 3, p171
- ISSN
2185-310X
- Publication type
Article
- DOI
10.22266/ijies2024.0630.15