High speed cryptography for network and disk encryption applications

نویسنده

  • Mohamed Abo El-Fotouh
چکیده

In this thesis, new ideas in cryptography, cryptanalysis and designing high speed secure applications are presented. The Advanced Encryption Standard (AES) is used to demonstrate these ideas. In the eld of cryptography, new encryption models are proposed. In the eld of cryptanalysis, a secure key schedule for AES is presented together with new generalized attacks. These generalized attacks are applied on AES. The proposed encryption models are used to design and develop new network encryption schemes and new modes of operation dedicated to disk encryption applications. Three new encryption models are proposed. All the proposed models share a main idea, which is splitting the encryption key into a primary and a secondary key. The secondary key together with the primary key are used to determine how the plaintext will be encrypted. The main functionality of the secondary key is to change the way the block cipher behaves, in other words by encrypting two identical plaintexts with the same primary key but two di erent secondary keys, the result is two di erent ciphertexts. The guidelines to use these models securely are also presented and the possibility to combine these models with each other is discussed. In order to increase the security of the proposed encryption models, a generalized secure key schedule for block ciphers is proposed. This key schedule uses a secure cipher in the counter mode, and eliminates related-key attacks. It also increases the complexity of the exhaustive key search attack. Additionally, new ideas in cryptanalysis are proposed, which can improve some chosen plaintext, chosen ciphertext, chosen plaintext-adaptive chosen ciphertext and chosen ciphertext-adaptive chosen plaintext attacks. Using these new ideas, attacks on 5and 6-round AES are mounted; to the best of the author's knowledge, these attacks use the least amount of chosen plaintext in the literature to attack 5and 6-round AES. To demonstrate the usage of the proposed encryption models in realistic scenarios, new network encryption schemes and disk encryption modes of operation are developed. These network encryption schemes allow a higher throughput than the current solutions. Furthermore, these schemes require much lower memory, which increases the number of concurrent clients a server can serve. For disk encryption applications, several new encryption modes of operation are developed and some of the current modes of operation are improved. These new modes of operation o er a higher throughput in accessing disks than current solutions.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Application Specific Scalable Architectures for Advanced Encryption Standard (AES) Algorithm

The work presented proposes two diverse FPGA based architectures with high-speed and low area constraints for suitable implementation of Advanced Encryption Standard (AES). The main focus of this paper is to compare different design architectures existing in literature with the proposed ones, based on application specific constraints. The high speed design presented here proposes a good enginee...

متن کامل

An efficient secure channel coding scheme based on polar codes

In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...

متن کامل

Research on Design Method Based on Hardware Encryption and Two-way ID Authentication for Security Mobile Hard Disk

The design Method of the "Security Mobile Hard Disk Based on Hardware Encryption and Twoway ID Authentication" adopts the smart card-based technology of two way ID authentication, thus enables higher authentication strength than ordinary password authentication and USB-KEY one way certification; adoption of dedicated hardware encryption chip on encrypting the hard disk data enhances the encrypt...

متن کامل

Comparison of two Public Key Cryptosystems

Since the time public-key cryptography was introduced by Diffie andHellman in 1976, numerous public-key algorithms have been proposed. Some of thesealgorithms are insecure and the others that seem secure, many are impractical, eitherthey have too large keys or the cipher text they produce is much longer than theplaintext. This paper focuses on efficient implementation and analysis of two mostpo...

متن کامل

The Idea Of Using The Steganography As Encryption Tool

the increasing use of computers and the widespread use of networks, Social networking and use applications through the use of the Internet to make the spread images, which make it easy to be penetrated from the attacker and from everyone who try to change the information. So, the need arises to transmit the information securely through a secure manner . Steganography is the best solution to sol...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009