Implementation of a Double Sequence Encryption Scheme Based on Chaotic Map

Article Preview

Abstract:

this paper presents a new scheme for enhancing the security of full disk encryption relying on the double sequence encryption based on chaotic map in order to improve the performance of its practical implementation. The aims of the proposed scheme are to design a keystream generator for the tweakable enciphering mode in space or time sequence using the real-time embedded device through sequential change detection on the disk read-and-write request. This design of the scheme is based on re-keying principle and derived from information-theoretical evaluation. Analyses show that the scheme is provably secure and can prevent inner and outer attackers from attacking. To the best of our knowledge, the scheme offers the first comprehensive solution to the watermarking attack in the same sector.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 765-767)

Pages:

1073-1076

Citation:

Online since:

September 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] P. Crowley. Mercy, A Fast Large Block Cipher for Disk Sector Encryption, B. Schneier(Ed. ): Fast Software Encryption, 7th International Workshop(FSE2000), LNCS 1978, Berlin: Springer-Verlag, pp: 49–63.

DOI: 10.1007/3-540-44706-7_4

Google Scholar

[2] Ivan Damgard, Kasper Dupont, Universally Composable Disk Encryption Schemes, http: /eprint. iacr. org/2005/ 333. pdf.

Google Scholar

[3] M. Liskov, R. Rivest, and D. Wagner, Tweakable block ciphers", M. Yung(Ed. ): Advances in Cryptology-CRYPTO , 02, LNCS 2442, Berlin: Springer-Verlag, 2002, pp: 31-46.

DOI: 10.1007/3-540-45708-9_3

Google Scholar

[4] S. Halevi, P. Rogaway, A Parallelizable Enciphering Mode", T. Oksmoto(Ed. ): Topics in Cryptology-CT-RSA , 04, LNCS 2964, Berlin: Springer-Verlag, 2004, pp: 292-304.

DOI: 10.1007/978-3-540-24660-2_23

Google Scholar

[5] A. Oprea, M. K. Reiter, and K. Yang, Space-efficient block storage integrity, In Proc. Network and Distributed System Security Symposium (NDSS). ISOC, 2005. http: /www. cs. cmu. edu/~alina /papers/storageint. pdf.

Google Scholar

[6] Michel Abdalla and Mihir Bellare, Increasing the lifetime of a key: A comparitiveanalysis of the security of rekeying techniques, T. Okamoto(Ed. ) Advances in Cryptology - Asiacrypt 2000 Proceedings, LNCS 1976, Springer-Verlag, 2000, pp: 546-559.

DOI: 10.1007/3-540-44448-3_42

Google Scholar

[7] A Pande, J Zambreno A Chaotic Encryption Scheme for Real-time Embedded Systems: Design and Implementation, Journal of Telecommunication Systems, special issue on chaotic cryptography, Springer, (2011).

DOI: 10.1007/s11235-011-9460-1

Google Scholar