2018
DOI: 10.1016/s1361-3723(18)30025-3
|View full text |Cite
|
Sign up to set email alerts
|

A novel key expansion technique using diffusion

Abstract: The security of encryption techniques depends a great deal on the proper manipulation of keys during the encryption process. Improper key handling and use may lead to malicious actors being able to predict the key and consequently endanger the security of the data.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…Although literature has reported many techniques that can expand a sequence of n symbols to a longer sequence (e.g. 18 , 19 ), this paper utilizes SHA-512 20 . SHA-512 is a one-way, fast, and has high avalanche effect; making it a perfect choice for key expansion.…”
Section: Sealing Layermentioning
confidence: 99%
“…Although literature has reported many techniques that can expand a sequence of n symbols to a longer sequence (e.g. 18 , 19 ), this paper utilizes SHA-512 20 . SHA-512 is a one-way, fast, and has high avalanche effect; making it a perfect choice for key expansion.…”
Section: Sealing Layermentioning
confidence: 99%
“…The encryption key must, therefore, be expanded to match the length of the output (the ciphertext). One of the effective and efficient secret key expansion techniques is proposed in [ 53 ]. This expansion technique has three important properties that make it ideal for our approach.…”
Section: Distortion Processmentioning
confidence: 99%
“…For the sake of self-containment, we provide a succinct description of the key expansion technique and refer the interested readers to [ 53 ] for more technical details. Fig 11 outlines the control flow of the key expansion technique.…”
Section: Distortion Processmentioning
confidence: 99%
See 1 more Smart Citation
“…To conceal the correlation between the round input and round output, each sub-key is shuffled with the round data. Therefore, creating a strong KEA plays a crucial role in the advancement of any symmetric block cipher system since its effectiveness directly impacts the security of the entire block cipher [7]- [9]. Therefore, a KEA must generate sub-keys with a high degree of randomness and also exhibit robust confusion and diffusion characteristics, ensuring that all derived sub-keys are independent of one another.…”
Section: Introductionmentioning
confidence: 99%