Preview

Authenticated encryption mode with blocks skipping

https://doi.org/10.21122/2309-4923-2021-3-59-65

Abstract

Block symmetric ciphers are one of the most important components of modern information security systems. At the same time, in addition to the structure of the applied block symmetric cipher, the cryptographic strength and performance of the information protection system is largely determined by the applied encryption mode. In addition to high performance and high-quality destruction of block statistics, modern encryption modes should also protect encrypted information from occurred or intentionally introduced errors. In this paper, we have developed an encryption mode with blocks skipping and using a pseudo-random key sequence generator, which allows checking the integrity of encrypted information with accurate detection of the place where an error was introduced. In this case, the error detection accuracy is determined by the adjustable parameter of the macroblock size and can be set depending on the level of importance of the protected information. The developed encryption mode is characterized by the following key advantages: reducing the number of required encryption operations by half, while providing a high level of cryptographic quality; more effective destruction of macroblock statistics due to the use of an additional generator of pseudo-random key sequences, the impossibility of propagation of the occurred (intentionally introduced) error outside the macroblock, as well as higher values of the number of protection levels due to the possibility of classifying the initial states of the applied generators of pseudo-random key sequences. As proposed in this paper, the mode of authenticated encryption with blocks skipping can be recommended for use on mobile platforms that are demanding both in terms of the quality and reliability of the protected information and are limited in terms of computing and power resources.

About the Authors

A. V. Sokolov
Odessa National Polytechnic University
Ukraine

Artem Sokolov. Associate Professor of the Department of Cybersecurity and Software

Odessa



D. A. Isakov
Odessa National Polytechnic University
Ukraine

Dmitry Isakov. He is a fourth-year student, specializing in Cybersecurity

Odessa



References

1. Zhdanov O. N. Methodology for selecting key information for a block cipher algorithm. M .: INFRA-M, 2013. 90 p.

2. Sokolov A. V. New methods of synthesis of nonlinear transformations for modern ciphers. Lap Lambert Academic Publishing, Germany, 2015. 100 p.

3. Sokolov A. V., Zhdanov O. N. Cryptographic constructions based on many-valued logic functions. Monograph. M: Scientific Thought, 2020. 192 p.

4. Schneier B. Applied Cryptography: Protocols, Algorithms and Source Code in C. Wiley, 2015. 784 p.

5. Sokolov A. V., Korzh A. O. Study of block skip encryption modes. Informatics and mathematical methods in modeling. 2020, Vol. 10, No. 1/2. P. 100–108.

6. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications / A. Rukhin, J. Soto, J. Nechvatal et al. National Institute of Standards and Technology Special Publication, 2010. 131 p.

7. Ishai Y. et al. Robust pseudorandom generators. International Colloquium on Automata, Languages, and Programming. Springer, Berlin, Heidelberg, 2013. P. 576–588.

8. Aljohani M. et al. Performance analysis of cryptographic pseudorandom number generators. IEEE Access. 2019. Vol. 7. P. 39794–39805.

9. Datcu O., Macovei C., Hobincu R. Chaos based cryptographic pseudo-random number generator template with dynamic state change. Applied Sciences. 2020. Vol. 10, No. 2. P. 451.

10. Mazurkov M. I., Sokolov A. V., Barabanov N.A. The key sequences generator based on bent functions dual couples. Proceedings of Odessa Polytechnic University, 2013. No. 3. P. 150–156.

11. Sokolov, A. V. The cellular automata key sequences generator. Proceedings of Odessa Polytechnic University, 2014. No. 1 (43). P. 180–186.

12. Bellare M., Namprempre C. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. Journal of Cryptology. 2008. Т. 21. No. 4. P. 469–491.


Review

For citations:


Sokolov A.V., Isakov D.A. Authenticated encryption mode with blocks skipping. «System analysis and applied information science». 2021;(3):59-65. https://doi.org/10.21122/2309-4923-2021-3-59-65

Views: 2458


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2309-4923 (Print)
ISSN 2414-0481 (Online)