An Enhanced Key Schedule Algorithm of PRESENT-128 Block Cipher for Random and Non-Random Secret Keys

The key schedule algorithm (KSA) is a crucial element of symmetric block ciphers with a direct security impact. Despite its undeniable significance, the KSA is still a less focused area in the design of an encryption algorithm. PRESENT is a symmetric lightweight block cipher that provides the optima...

Full description

Bibliographic Details
Main Authors: Maria Imdad, Sofia Najwa Ramli, Hairulnizam Mahdin
Format: Article
Language:English
Published: MDPI AG 2022-03-01
Series:Symmetry
Subjects:
Online Access:https://www.mdpi.com/2073-8994/14/3/604
_version_ 1797441476803690496
author Maria Imdad
Sofia Najwa Ramli
Hairulnizam Mahdin
author_facet Maria Imdad
Sofia Najwa Ramli
Hairulnizam Mahdin
author_sort Maria Imdad
collection DOAJ
description The key schedule algorithm (KSA) is a crucial element of symmetric block ciphers with a direct security impact. Despite its undeniable significance, the KSA is still a less focused area in the design of an encryption algorithm. PRESENT is a symmetric lightweight block cipher that provides the optimal balance between security, performance, and minimal cost in IoT. However, the linear functions in KSA lead to a slow and predictable bit transition, indicating the relationship between round keys. A robust KSA should produce random and independent round keys irrespective of the secret key. Therefore, this research aims to improve the KSA PRESENT-128 block cipher with enhanced randomness, round key bit difference, and the avalanche effect. The experiments on round keys and ciphertext with random, low density and high-density secret key datasets endorse the expected improvements. Moreover, the results show that the improved KSA produces random round keys that successfully pass the NIST randomness test. The bit transition from one round key to another is increased from 20% to 40%, where a greater inclination of the avalanche effect has an increased effect with 50% bit change. On the other hand, the improved KSA PRESENT requires an additional <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>0.001871</mn></mrow></semantics></math></inline-formula> s to generate round keys, as a security cost trade-off.
first_indexed 2024-03-09T12:23:38Z
format Article
id doaj.art-524c4dfae70a4fcb8613bb8948ec7608
institution Directory Open Access Journal
issn 2073-8994
language English
last_indexed 2024-03-09T12:23:38Z
publishDate 2022-03-01
publisher MDPI AG
record_format Article
series Symmetry
spelling doaj.art-524c4dfae70a4fcb8613bb8948ec76082023-11-30T22:36:55ZengMDPI AGSymmetry2073-89942022-03-0114360410.3390/sym14030604An Enhanced Key Schedule Algorithm of PRESENT-128 Block Cipher for Random and Non-Random Secret KeysMaria Imdad0Sofia Najwa Ramli1Hairulnizam Mahdin2Center of Information Security Research, Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn Malaysia, Batu Pahat 86400, MalaysiaCenter of Information Security Research, Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn Malaysia, Batu Pahat 86400, MalaysiaCenter of Intelligence and Autonomous Systems, Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn Malaysia, Batu Pahat 86400, MalaysiaThe key schedule algorithm (KSA) is a crucial element of symmetric block ciphers with a direct security impact. Despite its undeniable significance, the KSA is still a less focused area in the design of an encryption algorithm. PRESENT is a symmetric lightweight block cipher that provides the optimal balance between security, performance, and minimal cost in IoT. However, the linear functions in KSA lead to a slow and predictable bit transition, indicating the relationship between round keys. A robust KSA should produce random and independent round keys irrespective of the secret key. Therefore, this research aims to improve the KSA PRESENT-128 block cipher with enhanced randomness, round key bit difference, and the avalanche effect. The experiments on round keys and ciphertext with random, low density and high-density secret key datasets endorse the expected improvements. Moreover, the results show that the improved KSA produces random round keys that successfully pass the NIST randomness test. The bit transition from one round key to another is increased from 20% to 40%, where a greater inclination of the avalanche effect has an increased effect with 50% bit change. On the other hand, the improved KSA PRESENT requires an additional <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>0.001871</mn></mrow></semantics></math></inline-formula> s to generate round keys, as a security cost trade-off.https://www.mdpi.com/2073-8994/14/3/604block ciphercryptographygate equivalencekey schedule algorithmkey sensitivityplaintext sensitivity
spellingShingle Maria Imdad
Sofia Najwa Ramli
Hairulnizam Mahdin
An Enhanced Key Schedule Algorithm of PRESENT-128 Block Cipher for Random and Non-Random Secret Keys
Symmetry
block cipher
cryptography
gate equivalence
key schedule algorithm
key sensitivity
plaintext sensitivity
title An Enhanced Key Schedule Algorithm of PRESENT-128 Block Cipher for Random and Non-Random Secret Keys
title_full An Enhanced Key Schedule Algorithm of PRESENT-128 Block Cipher for Random and Non-Random Secret Keys
title_fullStr An Enhanced Key Schedule Algorithm of PRESENT-128 Block Cipher for Random and Non-Random Secret Keys
title_full_unstemmed An Enhanced Key Schedule Algorithm of PRESENT-128 Block Cipher for Random and Non-Random Secret Keys
title_short An Enhanced Key Schedule Algorithm of PRESENT-128 Block Cipher for Random and Non-Random Secret Keys
title_sort enhanced key schedule algorithm of present 128 block cipher for random and non random secret keys
topic block cipher
cryptography
gate equivalence
key schedule algorithm
key sensitivity
plaintext sensitivity
url https://www.mdpi.com/2073-8994/14/3/604
work_keys_str_mv AT mariaimdad anenhancedkeyschedulealgorithmofpresent128blockcipherforrandomandnonrandomsecretkeys
AT sofianajwaramli anenhancedkeyschedulealgorithmofpresent128blockcipherforrandomandnonrandomsecretkeys
AT hairulnizammahdin anenhancedkeyschedulealgorithmofpresent128blockcipherforrandomandnonrandomsecretkeys
AT mariaimdad enhancedkeyschedulealgorithmofpresent128blockcipherforrandomandnonrandomsecretkeys
AT sofianajwaramli enhancedkeyschedulealgorithmofpresent128blockcipherforrandomandnonrandomsecretkeys
AT hairulnizammahdin enhancedkeyschedulealgorithmofpresent128blockcipherforrandomandnonrandomsecretkeys