An Enhanced Key Schedule Algorithm of PRESENT-128 Block Cipher for Random and Non-Random Secret Keys
The key schedule algorithm (KSA) is a crucial element of symmetric block ciphers with a direct security impact. Despite its undeniable significance, the KSA is still a less focused area in the design of an encryption algorithm. PRESENT is a symmetric lightweight block cipher that provides the optima...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2022-03-01
|
Series: | Symmetry |
Subjects: | |
Online Access: | https://www.mdpi.com/2073-8994/14/3/604 |
_version_ | 1797441476803690496 |
---|---|
author | Maria Imdad Sofia Najwa Ramli Hairulnizam Mahdin |
author_facet | Maria Imdad Sofia Najwa Ramli Hairulnizam Mahdin |
author_sort | Maria Imdad |
collection | DOAJ |
description | The key schedule algorithm (KSA) is a crucial element of symmetric block ciphers with a direct security impact. Despite its undeniable significance, the KSA is still a less focused area in the design of an encryption algorithm. PRESENT is a symmetric lightweight block cipher that provides the optimal balance between security, performance, and minimal cost in IoT. However, the linear functions in KSA lead to a slow and predictable bit transition, indicating the relationship between round keys. A robust KSA should produce random and independent round keys irrespective of the secret key. Therefore, this research aims to improve the KSA PRESENT-128 block cipher with enhanced randomness, round key bit difference, and the avalanche effect. The experiments on round keys and ciphertext with random, low density and high-density secret key datasets endorse the expected improvements. Moreover, the results show that the improved KSA produces random round keys that successfully pass the NIST randomness test. The bit transition from one round key to another is increased from 20% to 40%, where a greater inclination of the avalanche effect has an increased effect with 50% bit change. On the other hand, the improved KSA PRESENT requires an additional <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>0.001871</mn></mrow></semantics></math></inline-formula> s to generate round keys, as a security cost trade-off. |
first_indexed | 2024-03-09T12:23:38Z |
format | Article |
id | doaj.art-524c4dfae70a4fcb8613bb8948ec7608 |
institution | Directory Open Access Journal |
issn | 2073-8994 |
language | English |
last_indexed | 2024-03-09T12:23:38Z |
publishDate | 2022-03-01 |
publisher | MDPI AG |
record_format | Article |
series | Symmetry |
spelling | doaj.art-524c4dfae70a4fcb8613bb8948ec76082023-11-30T22:36:55ZengMDPI AGSymmetry2073-89942022-03-0114360410.3390/sym14030604An Enhanced Key Schedule Algorithm of PRESENT-128 Block Cipher for Random and Non-Random Secret KeysMaria Imdad0Sofia Najwa Ramli1Hairulnizam Mahdin2Center of Information Security Research, Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn Malaysia, Batu Pahat 86400, MalaysiaCenter of Information Security Research, Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn Malaysia, Batu Pahat 86400, MalaysiaCenter of Intelligence and Autonomous Systems, Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn Malaysia, Batu Pahat 86400, MalaysiaThe key schedule algorithm (KSA) is a crucial element of symmetric block ciphers with a direct security impact. Despite its undeniable significance, the KSA is still a less focused area in the design of an encryption algorithm. PRESENT is a symmetric lightweight block cipher that provides the optimal balance between security, performance, and minimal cost in IoT. However, the linear functions in KSA lead to a slow and predictable bit transition, indicating the relationship between round keys. A robust KSA should produce random and independent round keys irrespective of the secret key. Therefore, this research aims to improve the KSA PRESENT-128 block cipher with enhanced randomness, round key bit difference, and the avalanche effect. The experiments on round keys and ciphertext with random, low density and high-density secret key datasets endorse the expected improvements. Moreover, the results show that the improved KSA produces random round keys that successfully pass the NIST randomness test. The bit transition from one round key to another is increased from 20% to 40%, where a greater inclination of the avalanche effect has an increased effect with 50% bit change. On the other hand, the improved KSA PRESENT requires an additional <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>0.001871</mn></mrow></semantics></math></inline-formula> s to generate round keys, as a security cost trade-off.https://www.mdpi.com/2073-8994/14/3/604block ciphercryptographygate equivalencekey schedule algorithmkey sensitivityplaintext sensitivity |
spellingShingle | Maria Imdad Sofia Najwa Ramli Hairulnizam Mahdin An Enhanced Key Schedule Algorithm of PRESENT-128 Block Cipher for Random and Non-Random Secret Keys Symmetry block cipher cryptography gate equivalence key schedule algorithm key sensitivity plaintext sensitivity |
title | An Enhanced Key Schedule Algorithm of PRESENT-128 Block Cipher for Random and Non-Random Secret Keys |
title_full | An Enhanced Key Schedule Algorithm of PRESENT-128 Block Cipher for Random and Non-Random Secret Keys |
title_fullStr | An Enhanced Key Schedule Algorithm of PRESENT-128 Block Cipher for Random and Non-Random Secret Keys |
title_full_unstemmed | An Enhanced Key Schedule Algorithm of PRESENT-128 Block Cipher for Random and Non-Random Secret Keys |
title_short | An Enhanced Key Schedule Algorithm of PRESENT-128 Block Cipher for Random and Non-Random Secret Keys |
title_sort | enhanced key schedule algorithm of present 128 block cipher for random and non random secret keys |
topic | block cipher cryptography gate equivalence key schedule algorithm key sensitivity plaintext sensitivity |
url | https://www.mdpi.com/2073-8994/14/3/604 |
work_keys_str_mv | AT mariaimdad anenhancedkeyschedulealgorithmofpresent128blockcipherforrandomandnonrandomsecretkeys AT sofianajwaramli anenhancedkeyschedulealgorithmofpresent128blockcipherforrandomandnonrandomsecretkeys AT hairulnizammahdin anenhancedkeyschedulealgorithmofpresent128blockcipherforrandomandnonrandomsecretkeys AT mariaimdad enhancedkeyschedulealgorithmofpresent128blockcipherforrandomandnonrandomsecretkeys AT sofianajwaramli enhancedkeyschedulealgorithmofpresent128blockcipherforrandomandnonrandomsecretkeys AT hairulnizammahdin enhancedkeyschedulealgorithmofpresent128blockcipherforrandomandnonrandomsecretkeys |