A New Adaptive SSC and SSSC Stream Cipher Model Design and Implementation

Article Preview

Abstract:

To solve the problem of construction for stream cipher key generator and the problem of SSC/SSSC stream ciphers need to relay on the secret channel to transmit the key, it presents a new clock function drive by a clock-control sequence and chaotic cascade function made of multiple Logistic function , which are used to built the self-reference model and chaotic module; it design a adapt controller independent of the key generator and encrypt module, achieve controlling encryption and transmission process by multi-threaded code;it makes a key generator with transformation ranks and wheel key method of AES and S-box of Camellia, which makes the sub-key and the key generator`s internal station become a insufficient condition that does not need to depend on the secret channel, the model achieves a exponential growth in the key space and the same application scope of traditional SSC and SSSC model. The new protocol model features can be seen under the actual operation of modifying RC4 algorithm.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 143-144)

Pages:

298-302

Citation:

Online since:

October 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] CE Shannon. Communication theory of secrecy systems[J]. Bell System Technical Journal, 1949, 28(4): 656-715.

DOI: 10.1002/j.1538-7305.1949.tb00928.x

Google Scholar

[2] Deng-Guo Feng. Abroad Cryptography Research and Development [J]. Communications, 2002, 23(5): 18-26.

Google Scholar

[3] C E Shannon. A Mathematical Theory of Communication[J]. Bell System Technical Journal, 1948, 27(4): 379-423, 623-656.

DOI: 10.1002/j.1538-7305.1948.tb00917.x

Google Scholar

[4] International Organization for Standardization. ISO/IEC 10181. 1: 1996, Information technology . Open Systems Interconnection. Security frameworks for open systems: Overview, (1996).

DOI: 10.3403/00910202u

Google Scholar

[5] Cui Guangliang. Based on parameters and Perturbation theory of chaotic secure system design.

Google Scholar

[6] Aquatic, Yan-Feng Chen, Wu Min, and so on. A new principle of chaotic encryption system solutions [J]. Circuits and Systems, 2006, 11 (1): 100-102.

Google Scholar

[7] Slottine J E, Li W. Applied Nonlinear Control [M]. Englewood Cliffs, NJ: Prentice Hall, (1991).

Google Scholar

[8] Huijuan, QIU Shui-sheng, Luminescence. AES algorithm based on chaotic map and image encryption scheme [J]. Computer Engineering, 2007, 24 (4).

Google Scholar

[9] W.E. Burr, Selecting the Advanced Encryption Standard. IEEE Security and Privacy, March/April 2003 1(2): 43-52.

DOI: 10.1109/msecp.2003.1193210

Google Scholar

[10] Jing-Wei Liu, Bao-Dian Wei, Sun Rong, Xin-mei. A new and practical security encryption standard algorithm-Camellia algorithm. Electronics applications, 2003, 11.

Google Scholar

[11] Kazunlaro Aoki,Tetsuya Ichikawa,etc.Camellia:A 128-Bit Block Cipher Suitable for MultiplePlatforms.http: /www.cosic.esat.kuleuven.ac. be/nessie/workshop/submissions/Cam elia.zip. 2001.9.26.

Google Scholar