scholarly journals Perancangan Teknik Kriptografi Block Cipher Berbasis Pola Batik Ceplok Yogyakarta

2020 ◽  
Vol 8 (1) ◽  
pp. 68
Author(s):  
Anriza Kurnia Aziiz ◽  
Magdalena A. Ineke Pakereng

Kriptografi adalah suatu ilmu untuk menjaga keamanan dan kerahasiaan suatu informasi. Dalam penelitian ini dirancang Kriptografi Block Cipher 64 bit Berbasis Pola Batik Ceplok Yogyakarta guna membangun kriptografi baru. Dalam kritografi ini dirancang dengan 10 putaran, dimana setiap putaran terdapat 4 proses. Pada setiap putaran terdapat 4 pola untuk proses plaintext dan 4 pola untuk proses kunci. Di proses kedua dan keempat ditransformasikan dengan tabel S-BOX untuk mendapatkan ciphertext yang lebih acak. Pengujian juga dilakukan menggunakan Avalanche Effect dan nilai Korelasi dimana ratarata perubahan karakter mencapai 47,656%, sehingga dapat digunakan sebagai alternatif dalam mengamankan data.

Advance Encryption Standard (AES) supersedes Data Encryption Standard (DES) and is the best known and most widely used block cipher. As for now, there are no known practical attacks that would allow anyone to read correctly implemented AES encrypted data. However, several theoretical attacks have been announced until now. A theoretical attack called Biclique Attack is known to have broken Full AES and requires 2126.1 , 2 189.7 , 2254.4 operations to recover an AES-128, AES-192, AES-256 respectively. Biclique Attack is faster than Brute force attack by a factor of four. As such, these theoretical attacks are of high computational complexity; they do not threaten the practical use of AES in any way. However, attacks always get better; they never get worse. As the technology evolves, successful attacks (using Quantum Computing and faster GPU) against AES may turn up, and they may be difficult to ignore. In this study, we aim to enhance the security prospects of AES with the inclusion of Dynamicity character in AES S-Box for increased resilience against Brute Force Attack and Biclique Attack, and hashing technique is combined with AES algorithm to achieve variance in security using MD4, SHA3 or SHA5. The novel key dispersion technique is introduced to increase the avalanche effect of AES algorithm.


2019 ◽  
Vol 3 (1) ◽  
pp. 43-51
Author(s):  
Yuana Sambadha Sambadha

The popularity of cybercrime caused unsafe information. Infrastructure IT made an effort to take in hand the problem, i.e. manipulating information. Cryptography existed as knowledge to protect information. To improve the security level, cryptography needs to be developed. Block Cipher Cryptography based on Dance Denok Deblong is designed to create a new cryptography. This cryptography is designed by using 4 process and 20 rounds. In fourth procesis transformed with S-BOX to get a more random ciphertext. Testing is also done using Avalanche Effect and Correlation value where the character change reaches 49,844%, so it can be used as an alternative in securing data


2021 ◽  
Vol 75 (3) ◽  
pp. 108-114
Author(s):  
N. Kapalova ◽  
◽  
К. Аlgazy ◽  
К. Sakan ◽  
D. Dyussenbayev ◽  
...  

This paper provides a brief description of the developed block cipher algorithm "AL03" and the results of checking the avalanche effect. This algorithm has the structure of a substitution-permutation network. The check consisted of two stages. At the first stage, the avalanche effect was tested separately for each transformation used in the algorithm. At the second stage, each round of encryption was analyzed. To characterize the degree of the avalanche effect in a transformation, the avalanche parameter is determined and used - the numerical value of the deviation of the probability of changing a bit in the output sequence when a bit in the input sequence changes from the required probability value equal to 0.5. The article presents the results after the 1st, 2nd, 3rd, and 24th rounds in the form of a table. Based on the round results obtained, comparative tests were carried out, as a result of which a positive conclusion was given on further research of this encryption algorithm.


2020 ◽  
Vol 17 (11) ◽  
pp. 5037-5045
Author(s):  
Alakananda Tripathy ◽  
Sateesh Kumar Pradhan ◽  
Ajit Kumar Nayak ◽  
Smita Rath ◽  
Alok Ranjan Tripathy

Security of data has become the biggest concern in recent years, due to the growing number of wireless networks. Accordingly, cryptography is becoming essential in improving data security. Encryption schemes that transforms the data into an incomprehensible shape. It plays an important role in applications such as wireless sensor networks, as most of the data is transmitted through an unsafe channel. Ultra-lightweight cryptography is one the most preferable research areas which having significant contribution towards the security aspects. There is a low power block cipher PRESENT. In this proposed work a PRESENT as reference block cipher is implemented. Here a method called PRESENT block cipher is used with key shuffling and S-Box. This method produces a 64 bits cipher text as result on input text of size 64 bits and key having of 128 bit. This developed method gives better results in comparison to other existing cipher on performance on different hardware and software platforms. With less memory requirement it produces a higher accuracy and confidentiality of the message is maintained. The proposed cipher have the better encryption time, decryption time, throughput. This proposed cipher has better resistance to crypt analysis according to avalanche effect. This proposed cipher can well be applicable for application where small traced area and low power decadence are vital design metrics.


Electronics ◽  
2020 ◽  
Vol 9 (8) ◽  
pp. 1304
Author(s):  
Thomas Haywood Dadzie ◽  
Jiwon Lee ◽  
Jihye Kim ◽  
Hyunok Oh

The Non-Volatile Memory (NVM), such as PRAM or STT-MRAM, is often adopted as the main memory in portable embedded systems. The non-volatility triggers a security issue against physical attacks, which is a vulnerability caused by memory extraction and snapshots. However, simply encrypting the NVM degrades the performance of the memory (high energy consumption, short lifetime), since typical encryption causes an avalanche effect while most NVMs suffer from the memory-write operation. In this paper, we propose NVM-shelf: Secure Hybrid Encryption with Less Flip (shelf) for Non-Volatile Memory (NVM), which is hybrid encryption to reduce the flip penalty. The main idea is that a stream cipher, such as block cipher CTR mode, is flip-tolerant when the keystream is reused. By modifying the CTR mode in AES block cipher, we let the keystream updated in a short period and reuse the keystream to achieve flip reduction while maintaining security against physical attacks. Since the CTR mode requires additional storage for the nonce, we classify write-intensive cache blocks and apply our CTR mode to the write-intensive blocks and apply the ECB mode for the rest of the blocks. To extend the cache-based NVM-shelf implementation toward SPM-based systems, we also propose an efficient compiler for SA-SPM: Security-Aware Scratch Pad Memory, which ensures the security of main memories in SPM-based embedded systems. Our compiler is the first approach to support full encryption of memory regions (i.e., stack, heap, code, and static variables) in an SPM-based system. By integrating the NVM-shelf framework to the SA-SPM compiler, we obtain the NVM-shelf implementation for both cache-based and SPM-based systems. The cache-based experiment shows that the NVM-shelf achieves encryption flip penalty less than 3%, and the SPM-based experiment shows that the NVM-shelf reduces the flip penalty by 31.8% compared to the whole encryption.


Author(s):  
T. Yu. Zyryanova ◽  
◽  
N. A. Raspopov ◽  

This article discusses the implementation of the Diffie-Hellman protocol in an unprotected channel. The essence of this method is to use steganography to transmit the public key in an unsecured channel. The public key is encrypted using a block cipher and encoded into the pic-ture using the LSB method. The uniqueness of the picture and the impossibility of changing the key is ensured by the avalanche effect. The implementation of the Diffie-Hellman protocol in an insecure channel has long remained relevant, although there is a solution in the form of public key infrastructure, but in this article a new solution to this problem was proposed.


2018 ◽  
Vol 8 (3) ◽  
pp. 205
Author(s):  
R. Benny Gandara

Standar IEEE 802.15.4 merupakan standar acuan pengembangan protokol yang diterapkan untuk teknologi industrial wireless sensor network pada saat ini. Unsur keamanan data dalam industrial wireless sensor network perlu untuk diperhatikan karena dampak gangguan yang timbul akan dapat berpengaruh secara langsung pada proses industri yang sedang beroperasi dan berdampak pada keselamatan pekerja, peralatan dan lingkungan serta keekonomian. Metode enkripsi adalah metode umum yang dipergunakan dalam perlindungan data pada sistem wireless sensor network. Metode enkripsi pada layer physical dengan menggunakan algoritma stream cipher Rabbit dipergunakan sebagai metode alternatif perlindungan data pada sistem aplikasi industrial wireless sensor network yang mana pada umumnya menggunakan metode enkripsi block cipher pada lapisan upper layer. Algoritma Rabbit akan dibandingkan dengan algoritma RC4 yang telah diteliti sebelumnya. Dari hasil simulasi, algoritma Rabbit dengan jumlah kunci yang lebih pendek dan cipher text yang lebih sedikit dapat memberikan hasil yang lebih baik untuk nilai avalanche effect, entrophy dan penggunaan CPU dibandingkan dengan algoritma RC4. Meskipun mendapatkan hasil yang bervariasi pada penggunaan memori dan end to end delay, algoritma Rabbit pada jumlah node tertentu masih dapat memenuhi standar kebutuhan industri untuk aplikasi sektor migas.


Advance Encryption Standard (AES) supersedes Data Encryption Standard (DES) and is the best known and most widely used block cipher. As for now, there are no known practical attacks that would allow anyone to read correctly implemented AES encrypted data. However, several theoretical attacks have been announced until now. A theoretical attack called Biclique Attack is known to have broken Full AES and requires 2126.1 , 2189.7 , 2254.4 operations to recover an AES-128, AES-192, AES-256 respectively. Biclique Attack is faster than Brute force attack by a factor of four. As such, these theoretical attacks are of high computational complexity; they do not threaten the practical use of AES in any way. However, attacks always get better; they never get worse. As the technology evolves, successful attacks (using Quantum Computing and faster GPU) against AES may turn up, and they may be difficult to ignore. In this study, we aim to enhance the security prospects of AES with the inclusion of Dynamicity character in AES S-Box for increased resilience against Brute Force Attack and Biclique Attack, and hashing technique is combined with AES algorithm to achieve variance in security using MD4, SHA3 or SHA5. The novel key dispersion technique is introduced to increase the avalanche effect of AES algorithm.


2017 ◽  
Vol 67 (6) ◽  
pp. 636 ◽  
Author(s):  
Manoj Kumar ◽  
Dhananjoy Dey ◽  
Saibal K Pal ◽  
Anupama Panigrahi

<p class="p1">A new hash function <em>HeW: </em>A hash function based on light weight block cipher <em>FeW </em>is proposed in this paper. The compression function of <em>HeW </em>is based on block cipher <em>FeW</em>. It is believed that key expansion algorithm of block cipher slows down the performance of the overlying hash function. Thereby, block ciphers become a less favourable choice to design a compression function. As a countermeasure, we cut down the key size of <em>FeW </em>from 80-bit to 64-bit and provide a secure and efficient key expansion algorithm for the modified key size. <em>FeW </em>based compression function plays a vital role to enhance the efficiency of <em>HeW</em>. We test the hash output for randomness using the NIST statistical test suite and test the avalanche effect, bit variance and near collision resistance. We also give the security estimates of <em>HeW </em>against differential cryptanalysis, length extension attack, slide attack and rotational distinguisher.<span class="Apple-converted-space"> </span></p>


Sign in / Sign up

Export Citation Format

Share Document