A multi-shape hybrid symmetric encryption algorithm to thwart attacks based on the knowledge of the used cryptographic suite

This research paper introduces a novel symmetric encryption algorithm that provides the confidentiality security service without leaking enough information about the exact encryption algorithm or other cryptographic parameters to anyone except the legitimate receiver. This is achieved by utilizing a...

Full description

Bibliographic Details
Main Authors: Altigani, Abdelrahman, Hasan, Shafaatunnur, Shamsuddin, Siti Mariyam, Barry, Bazara
Format: Article
Published: Elsevier Ltd 2019
Subjects:
_version_ 1796864667158577152
author Altigani, Abdelrahman
Hasan, Shafaatunnur
Shamsuddin, Siti Mariyam
Barry, Bazara
author_facet Altigani, Abdelrahman
Hasan, Shafaatunnur
Shamsuddin, Siti Mariyam
Barry, Bazara
author_sort Altigani, Abdelrahman
collection ePrints
description This research paper introduces a novel symmetric encryption algorithm that provides the confidentiality security service without leaking enough information about the exact encryption algorithm or other cryptographic parameters to anyone except the legitimate receiver. This is achieved by utilizing a set of sound existing symmetric encryption algorithms, namely, the Advanced Encryption Standard,MARS,RC6, Serpent and Twofish. The identity of the algorithm used to secure the current message, along with other cryptographic parameters (e.g. mode of operation, key length), are hidden from anyone except the legitimate receiver. These parameters are shared securely between communicating parties by utilizing some of the symmetric key bits. The cipher suite in addition to the encryption key, changes systematically and securely with every new message, leaving the opponent with no enough information to launch any effective attack. The algorithm performance is tested, and the overall performance is close to the performance of conventional encryption with a delay of about 16.52 CPU Cycles per message. From a security point of view, the possibility of cryptanalysis is diminished significantly, as no party except communicating parties has any knowledge of the cryptographic parameters in use.
first_indexed 2024-03-05T20:45:18Z
format Article
id utm.eprints-88627
institution Universiti Teknologi Malaysia - ePrints
last_indexed 2024-03-05T20:45:18Z
publishDate 2019
publisher Elsevier Ltd
record_format dspace
spelling utm.eprints-886272020-12-15T10:35:46Z http://eprints.utm.my/88627/ A multi-shape hybrid symmetric encryption algorithm to thwart attacks based on the knowledge of the used cryptographic suite Altigani, Abdelrahman Hasan, Shafaatunnur Shamsuddin, Siti Mariyam Barry, Bazara QA75 Electronic computers. Computer science This research paper introduces a novel symmetric encryption algorithm that provides the confidentiality security service without leaking enough information about the exact encryption algorithm or other cryptographic parameters to anyone except the legitimate receiver. This is achieved by utilizing a set of sound existing symmetric encryption algorithms, namely, the Advanced Encryption Standard,MARS,RC6, Serpent and Twofish. The identity of the algorithm used to secure the current message, along with other cryptographic parameters (e.g. mode of operation, key length), are hidden from anyone except the legitimate receiver. These parameters are shared securely between communicating parties by utilizing some of the symmetric key bits. The cipher suite in addition to the encryption key, changes systematically and securely with every new message, leaving the opponent with no enough information to launch any effective attack. The algorithm performance is tested, and the overall performance is close to the performance of conventional encryption with a delay of about 16.52 CPU Cycles per message. From a security point of view, the possibility of cryptanalysis is diminished significantly, as no party except communicating parties has any knowledge of the cryptographic parameters in use. Elsevier Ltd 2019-06 Article PeerReviewed Altigani, Abdelrahman and Hasan, Shafaatunnur and Shamsuddin, Siti Mariyam and Barry, Bazara (2019) A multi-shape hybrid symmetric encryption algorithm to thwart attacks based on the knowledge of the used cryptographic suite. Journal of Information Security and Applications, 46 . pp. 210-221. ISSN 2214-2134 http://dx.doi.org/10.1016/j.jisa.2019.03.013
spellingShingle QA75 Electronic computers. Computer science
Altigani, Abdelrahman
Hasan, Shafaatunnur
Shamsuddin, Siti Mariyam
Barry, Bazara
A multi-shape hybrid symmetric encryption algorithm to thwart attacks based on the knowledge of the used cryptographic suite
title A multi-shape hybrid symmetric encryption algorithm to thwart attacks based on the knowledge of the used cryptographic suite
title_full A multi-shape hybrid symmetric encryption algorithm to thwart attacks based on the knowledge of the used cryptographic suite
title_fullStr A multi-shape hybrid symmetric encryption algorithm to thwart attacks based on the knowledge of the used cryptographic suite
title_full_unstemmed A multi-shape hybrid symmetric encryption algorithm to thwart attacks based on the knowledge of the used cryptographic suite
title_short A multi-shape hybrid symmetric encryption algorithm to thwart attacks based on the knowledge of the used cryptographic suite
title_sort multi shape hybrid symmetric encryption algorithm to thwart attacks based on the knowledge of the used cryptographic suite
topic QA75 Electronic computers. Computer science
work_keys_str_mv AT altiganiabdelrahman amultishapehybridsymmetricencryptionalgorithmtothwartattacksbasedontheknowledgeoftheusedcryptographicsuite
AT hasanshafaatunnur amultishapehybridsymmetricencryptionalgorithmtothwartattacksbasedontheknowledgeoftheusedcryptographicsuite
AT shamsuddinsitimariyam amultishapehybridsymmetricencryptionalgorithmtothwartattacksbasedontheknowledgeoftheusedcryptographicsuite
AT barrybazara amultishapehybridsymmetricencryptionalgorithmtothwartattacksbasedontheknowledgeoftheusedcryptographicsuite
AT altiganiabdelrahman multishapehybridsymmetricencryptionalgorithmtothwartattacksbasedontheknowledgeoftheusedcryptographicsuite
AT hasanshafaatunnur multishapehybridsymmetricencryptionalgorithmtothwartattacksbasedontheknowledgeoftheusedcryptographicsuite
AT shamsuddinsitimariyam multishapehybridsymmetricencryptionalgorithmtothwartattacksbasedontheknowledgeoftheusedcryptographicsuite
AT barrybazara multishapehybridsymmetricencryptionalgorithmtothwartattacksbasedontheknowledgeoftheusedcryptographicsuite