About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
3rd International ICST Conference on COMmunication System SoftWAre and MiddlewaRE

Research Article

Key-Linked Block Ciphers with Input-Output Shuffling Applied to Remotely Keyed Encryption

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/COMSWA.2008.4554419,
        author={Y. M. Y. Hasan and H.A. Abulenein},
        title={Key-Linked Block Ciphers with Input-Output Shuffling Applied to Remotely Keyed Encryption},
        proceedings={3rd International ICST Conference on COMmunication System SoftWAre and MiddlewaRE},
        publisher={IEEE},
        proceedings_a={COMSWARE},
        year={2008},
        month={6},
        keywords={},
        doi={10.1109/COMSWA.2008.4554419}
    }
    
  • Y. M. Y. Hasan
    H.A. Abulenein
    Year: 2008
    Key-Linked Block Ciphers with Input-Output Shuffling Applied to Remotely Keyed Encryption
    COMSWARE
    IEEE
    DOI: 10.1109/COMSWA.2008.4554419
Y. M. Y. Hasan1,*, H.A. Abulenein2,*
  • 1: Electrical Engineering Dept., Assiut University, Arab Republic of Egypt
  • 2: Electrical Engineering Dept., Assiut University, Arab Republic of Egypt ,Computer Science & Information Dept., Taibah University, Kingdom of Saudi Arabia
*Contact email: ymyhasan@aun.edu.eg_, haboulenien@hotmail.com

Abstract

We propose a more generalized Feistel network-like structure, with pre- (or post-) pseudorandom shuffling of the input (output) before (after, respectively) ciphering using two reversibly key-linked block ciphers, that is suitable for remotely keyed encryption. The security of the proposed structure is theoretically proved and new algorithms for the required pseudorandom shuffling stage are presented. Considering the many advantages of reusability, we apply this proposed universal ciphers merging structure for constructing practical new ciphers reviving the short-key DES and strengthening the security of the AES through stretching their key and block lengths. Since smart cards represent an effective tool for trustworthy portable storage of secret-keys and critical processes needed in many recent applications, we finally introduce an extremely secure length increasing remotely keyed encryption protocol allowing the use of a disposable (one–time) key for reliable long-term security.

Published
2008-06-27
Publisher
IEEE
Modified
2010-05-16
http://dx.doi.org/10.1109/COMSWA.2008.4554419
Copyright © 2008–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL