The transposition process is needed in cryptography to create a diffusion effect on data encryption standard (DES) and advanced encryption standard (AES) algorithms as standard information security algorithms by the National Institute of Standards and Technology. The problem with DES and AES algorithms is that their transposition index values form patterns and do not form random values. This condition will certainly make it easier for a cryptanalyst to look for a relationship between ciphertexts because some processes are predictable. This research designs a transposition algorithm called square transposition. Each process uses square 8 × 8 as a place to insert and retrieve 64-bits. The determination of the pairing of the input scheme and the retrieval scheme that have unequal flow is an important factor in producing a good transposition. The square transposition can generate random and non-pattern indices so that transposition can be done better than DES and AES.
AbstrakPenelitian ini mencari model baru dari fungsi polinomial yang dapat digunakan sebagai pembangkit bilangan acak berbasis CSPNRG chaos, kemudian dijadikan sebagai kunci pada kriptografi block cipher. Proses dilakukan dengan meregenerasi polinomial menggunakan fixed point iteration menjadi fungsi iteratif, dan pengambilan integer pada mantissa untuk memperoleh bilangan acak dari setiap iterasi.Setiap fungsi polinomial derajat-1, derajat-2, dan derajat-3 dapat digunakan sebagai fungsi pembangkit, tetapi diperlukan pemilihan koefisien dan konstanta yang tepat dan juga ketangkasan dalam proses manipulasi aljabar pada fixed point iteration. Secara spesifik, algoritma yang dirancang merupakan proses yang ampuh karena dapat menghasilkan bilangan acak walaupun secara fungsi iterasi tidak dapat menghasilkan bilangan acak.Pengujian korelasi pada block cipher menggunakan kunci dari bilangan acak berada pada kategori 'rendah', sehingga secara kriptografi kunci tersebut dapat membuat plainteks dan cipherteks tidak berhubungan secara statistik, kondisi ini akan mempersulit kriptanalis untuk melakukan krip-1
This study examines whether the function f(x)=x2-9x-99 can be used as a key generator in cryptography. The quadratic function is regenerated using the fixed point iteration method into an iteration function. The distribution of digits to the output of iterative function to generate a number of chaos. Randomization testing uses run test and monobit testing. Followed by cryptographic testing to get the correlation between ciphertext and key which will be used as a decision whether the resulting key is random or not. Based on research that has been done iteration function xi = (xi-12-9xi-1-99)/9 can generate CSRPNG Chaos random numbers with the correlation level closest to the value of 0.
<div class="page" title="Page 1"><div class="layoutArea"><div class="column"><p>The use of logistics functions as a random number generator in a cryptography algorithm is capable of accommodating the diffusion properties of the Shannon principle. The problem that occurs is initialization x was static and was not affected by changes in the key, so that the algorithm will generate a random number that is always the same. This study design three schemes that can providing the flexibility of the input keys in conducting the examination of the value of the domain logistics function. The results of each schemes do not show a pattern that is directly proportional or inverse with the value of x0 and relative error x and successfully fulfill the properties of the butterfly effect. Thus, the existence of logistics functions in generating chaos numbers can be accommodated based on key inputs. In addition, the resulting random numbers are distributed evenly over the chaos range, thus reinforcing the algorithm when used as a key in cryptography.</p></div></div></div>
The substitution process in block ciphers usually uses static s-boxes, where the value of each s-box entry is always fixed and the functions are one-to-one. Visually, the dataset pattern in the input is also seen in the output. This will make it easier for cryptanalysts to look at patterns and can predict behavior based on the input. This study designs a flexible s-box where each entry contains a linear function, with constants and coefficients generated by CSPRNG chaos from the key input. The strength of a flexible s-box can be seen when changing key inputs (although 1 bit different) will produce different s-boxes. In addition, the same input dataset values will produce different outputs, so flexible sboxes are one-to-many. Statistical tests show that the average correlation is in a low category. Tests on the cipher block also fulfill the Shannon Principle. The principle of Iterated Cipher with n-round is filled with n > 5 and 46n random numbers. The Avalanche Effect test on the algorithm gives better results than Twofish even though it is still below the DES. Intisari-Proses substitusi dalam blok cipher biasanya menggunakan s-box statis, dengan nilai pada setiap entri s-box selalu tetap, dan secara fungsi bersifat satu-ke-satu. Secara visual, pola dataset pada masukan terlihat juga pada keluaran. Hal ini akan mempermudah cryptanalyst untuk melihat pola dan dapat memprediksi perilaku berdasarkan masukan. Makalah ini merancang s-box fleksibel yang setiap entrinya berisi fungsi linier, dengan konstanta dan koefisien yang dibangkitkan oleh CSPRNG chaos dari masukan kunci. Kekuatan dari s-box fleksibel terlihat ketika perubahan masukan kunci (walaupun berbeda 1 bit) akan menghasilkan s-box yang berbeda. Selain itu, masukan nilai dataset yang sama akan menghasilkan keluaran yang berbeda, sehingga s-box fleksibel bersifat satu-ke-banyak. Uji statistik menunjukkan bahwa korelasi secara rata-rata berada pada kategori rendah. Pengujian pada blok cipher juga memenuhi prinsip Shannon. Prinsip Iterated Cipher dengan n-putaran dipenuhi dengan n > 5 dan 46n bilangan acak. Uji Avalanche Effect pada algoritme memberi hasil yang lebih baik dari Twofish walaupun masih di bawah DES. Kata Kunci-S-box fleksibel, blok cipher, CSPRNG chaos, fungsi linier.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.