3rd International ICST Conference on COMmunication System SoftWAre and MiddlewaRE

Research Article

Key-Linked Block Ciphers with Input-Output Shuffling Applied to Remotely Keyed Encryption

  • @INPROCEEDINGS{10.1109/COMSWA.2008.4554419,
        author={Y. M. Y. Hasan and H.A. Abulenein},
        title={Key-Linked Block Ciphers with Input-Output Shuffling Applied to Remotely Keyed Encryption},
        proceedings={3rd International ICST Conference on COMmunication System SoftWAre and MiddlewaRE},
        publisher={IEEE},
        proceedings_a={COMSWARE},
        year={2008},
        month={6},
        keywords={},
        doi={10.1109/COMSWA.2008.4554419}
    }
    
  • Y. M. Y. Hasan
    H.A. Abulenein
    Year: 2008
    Key-Linked Block Ciphers with Input-Output Shuffling Applied to Remotely Keyed Encryption
    COMSWARE
    IEEE
    DOI: 10.1109/COMSWA.2008.4554419
Y. M. Y. Hasan1,*, H.A. Abulenein2,*
  • 1: Electrical Engineering Dept., Assiut University, Arab Republic of Egypt
  • 2: Electrical Engineering Dept., Assiut University, Arab Republic of Egypt ,Computer Science & Information Dept., Taibah University, Kingdom of Saudi Arabia
*Contact email: ymyhasan@aun.edu.eg_, haboulenien@hotmail.com

Abstract

We propose a more generalized Feistel network-like structure, with pre- (or post-) pseudorandom shuffling of the input (output) before (after, respectively) ciphering using two reversibly key-linked block ciphers, that is suitable for remotely keyed encryption. The security of the proposed structure is theoretically proved and new algorithms for the required pseudorandom shuffling stage are presented. Considering the many advantages of reusability, we apply this proposed universal ciphers merging structure for constructing practical new ciphers reviving the short-key DES and strengthening the security of the AES through stretching their key and block lengths. Since smart cards represent an effective tool for trustworthy portable storage of secret-keys and critical processes needed in many recent applications, we finally introduce an extremely secure length increasing remotely keyed encryption protocol allowing the use of a disposable (one–time) key for reliable long-term security.