A Key Scheduling Algorithm Based on Dynamic Quasigroup String Transformation and All-Or-Nothing Key Derivation Function

Abdulkadir Hassan Disina, Sapiee Jamel, Muhammad Aamir, Zahraddeen A. Pindar, Mustafa Mat Deris, Kamaruddin Malik Mohamad

Abstract


Cryptographic ciphers depend on how quickly the key affects the output of the ciphers (ciphertext). Keys are traditionally generated from small size input (Seed) to a bigger size random key. Key scheduling algorithm (KSA) is the mechanism that generates and schedules all sub-keys for each round of encryption. Researches have suggested that sub-keys should be generated separately to avoid related-key attack. Similarly, the key space should be disproportionately large to resist any attack meant for secret keys. To archive that, some algorithms adopt the use of matrixes such as quasigroup, Hybrid cubes and substitution box (S-box) to generate the encryption keys. Quasigroup has other algebraic property called “Isotopism”, which literally means Different quasigroups that has the same order of elements but different arrangements. This paper proposed a Dynamic Key Scheduling Algorithm (KSA) using Isotope of a quasigroup as the dynamic substitution table. The proposed algorithm is a modification and upgrade to Allor-nothing Key Derivation Function (AKDF). To minimize the complexity of the algorithm, a method of generating Isotope from a non-associative quasigroup using one permutation is achieved. To validate the findings, non-associativity of the generated isotopes has been tested and the generated isotopes appeared to be non-associative. Furthermore, the proposed KSA algorithm will be validated using the Randomness test proposed and recommended by NIST, Avalanche and Correlation Assessment test.

Keywords


Key Scheduling Algorithm; Quasigroup; Random Number Generator; String Transformation;

Full Text:

PDF

References


S. Jamel, M. M. Deris, I. T. R. Yanto, and T. Herawan. “The hybrid cubes encryption algorithm (HiSea),” in Advances in Wireless, Mobile Networks and Applications. Communications in Computer and Information Science, S. S. Al-Majeed, C. L. Hu, and D. Nagamalai, Eds. Berlin, Heidelberg: Springer, 2011, pp. 191-200.

J. Kelsey, and B. Schneier. “Key-schedule cryptanalysis of DEAL,” in Selected Areas in Cryptography (SAC 1999). Lecture Notes in Computer Science, H. Heys, and C. Adams, Eds. Berlin, Heidelberg: Springer, 2000, pp. 118–134.

J. Kelsey, B. Schneier, and D. Wagner, “Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2 and TEA,” in Information and Communications Security, Y. Han, T. Okamoto, and S. Qing, Eds. Berlin, Heidelberg: Springer, pp. 233–246, 1997.

M. F. Mushtaq, S. Jamel, and M. M. Deris, “Triangular coordinate extraction (TCE) for hybrid cubes,” Journal of Engineering and Applied Science, vol.12, no. 8, pp. 2164-2169, 2017.

D. Rajavel, and S. P. Shantharajah, “Cubical key generation and encryption algorithm based on hybrid cube’s rotation,” in Proceedings of the International Conference on Pattern Recognition, Informatics and Medical Engineering, 2012, pp. 183-187.

V. Dimitrova, and J. Markovski, “On quasigroup pseudo random sequence generators,” in Proc. of the 1st Balkan Conf. on Informatics, 2004, pp. 21–23.

A. Krapeˇ, “An application of quasigroups in cryptology,” Math. Maced, vol. 8, pp. 47–52, 2010.

S. Markovski, D. Gligoroski, and L. Kocarev, “Unbiased random sequences from quasigroup string transformations,” in the Proceedings of the 12th Int. Workshop on Fast Software Encryption (FSE 2005), vol. 3557, 2005, pp. 163–180.

K. A. Meyer, A New Message Authentication Code Based on the NonAssociativity of Quasigroups. Retrospective Theses and Dissertations, 2006.

O. Grošek, “Isotopy of Latin squares in cryptography,” Tatra Mountains Mathematical Publications, vol. 45, pp. 27–36, 2010.

Smile Markovski, “Design of crypto premitives based on quasigroup,” Quasigr. Relat. Syst., vol. 23, pp. 41–90, 2015.

V. Bakeva, “Parastrophic quasigroup string processing,” in Proceedings of the Conference on Informatics and Information Technology, 2011, pp. 19–21.

A. Mileva and S. Markovski, “Shapeless Quasigroups Derived by Feistel Orthomorphisms,” Glasnik Matematički, vol. 47, no. 67, pp. 333–349, 2012.

H. Michael Damm, “Totally anti-symmetric quasigroups for all orders,” Discrete Math., vol. 307, no. 6, pp. 715–729, 2007.

H. Zorkta and T. Kabani, “New Cipher Algorithm Based on Multiple Quasigroups,” International Journal of Machine Learning and Computing, vol. 1, no. 5, pp. 454–459, 2011.

Z. Pindar, S. H. Jamel, A. Disina, and M. M. Deris, “Compression function based on permutations quasigroups,” ARPN Journal of Engineering and Applied Sciences, vol. 11, no. 12, pp. 1–8, 2015.

A. H. Disina, S. Jamel, Z. A. Pindar, and M. M. Deris, “All-or-nothing key derivation function based on quasigroup string,” in International Conference on Information Science and Security (ICISS), 2006, pp. 6– 10.

C. W. Chuah, E. Dawson, and L. Simpson, “Key derivation function: the SCKDF scheme,” in Security and Privacy Protection in Information Processing Systems, L. J. Janczewski, H. B. Wolfe, and S. Shenoi, Eds. Berlin, Heidelberg: Springer, 2013, pp. 125–138.

H. Krawczyk, “Cryptographic extraction and key derivation: The HKDF scheme,” in Lect. Notes Comput. Sci., vol. 6223 LNCS, 2010, pp. 631–648.

H. Ahmad, A. Hassan, M. Saeb, and H. D. Hamed, “The ‘PYRAMIDS’ block cipher,” International Journal of Network Security, vol. 2, pp. 50–60, 2005.

J. C. H. Castro, J. M. Sierra, A. Seznec, A. Izquierdo, and A. Ribagorda, “The strict avalanche criterion randomness test,” Math. Comput. Simul., vol. 68, no. 1, pp. 1–7, 2005.

S. Ramanujam, and M. Karuppiah, “Designing an algorithm with high Avalanche Effect,” Int. J. Comput. Sci. Netw. Secur., vol. 11, no. 1, pp. 106–111, 2011.

L. E. Bassham, A. L. Rukhin, J. Soto, J. R. Nechvatal, M. E. Smid, S. D. Leigh, M Levenson, M. Vangel, N. A. Heckert, and D. L. Banks, A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. National Institute of Standard and Technology, Technology Administration, US Department of Commerce, 2010.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

ISSN: 2180-1843

eISSN: 2289-8131