### A Key Scheduling Algorithm Based on Dynamic Quasigroup String Transformation and All-Or-Nothing Key Derivation Function

#### Abstract

#### Keywords

#### Full Text:

PDF#### References

S. Jamel, M. M. Deris, I. T. R. Yanto, and T. Herawan. “The hybrid cubes encryption algorithm (HiSea),” in Advances in Wireless, Mobile Networks and Applications. Communications in Computer and Information Science, S. S. Al-Majeed, C. L. Hu, and D. Nagamalai, Eds. Berlin, Heidelberg: Springer, 2011, pp. 191-200.

J. Kelsey, and B. Schneier. “Key-schedule cryptanalysis of DEAL,” in Selected Areas in Cryptography (SAC 1999). Lecture Notes in Computer Science, H. Heys, and C. Adams, Eds. Berlin, Heidelberg: Springer, 2000, pp. 118–134.

J. Kelsey, B. Schneier, and D. Wagner, “Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2 and TEA,” in Information and Communications Security, Y. Han, T. Okamoto, and S. Qing, Eds. Berlin, Heidelberg: Springer, pp. 233–246, 1997.

M. F. Mushtaq, S. Jamel, and M. M. Deris, “Triangular coordinate extraction (TCE) for hybrid cubes,” Journal of Engineering and Applied Science, vol.12, no. 8, pp. 2164-2169, 2017.

D. Rajavel, and S. P. Shantharajah, “Cubical key generation and encryption algorithm based on hybrid cube’s rotation,” in Proceedings of the International Conference on Pattern Recognition, Informatics and Medical Engineering, 2012, pp. 183-187.

V. Dimitrova, and J. Markovski, “On quasigroup pseudo random sequence generators,” in Proc. of the 1st Balkan Conf. on Informatics, 2004, pp. 21–23.

A. Krapeˇ, “An application of quasigroups in cryptology,” Math. Maced, vol. 8, pp. 47–52, 2010.

S. Markovski, D. Gligoroski, and L. Kocarev, “Unbiased random sequences from quasigroup string transformations,” in the Proceedings of the 12th Int. Workshop on Fast Software Encryption (FSE 2005), vol. 3557, 2005, pp. 163–180.

K. A. Meyer, A New Message Authentication Code Based on the NonAssociativity of Quasigroups. Retrospective Theses and Dissertations, 2006.

O. Grošek, “Isotopy of Latin squares in cryptography,” Tatra Mountains Mathematical Publications, vol. 45, pp. 27–36, 2010.

Smile Markovski, “Design of crypto premitives based on quasigroup,” Quasigr. Relat. Syst., vol. 23, pp. 41–90, 2015.

V. Bakeva, “Parastrophic quasigroup string processing,” in Proceedings of the Conference on Informatics and Information Technology, 2011, pp. 19–21.

A. Mileva and S. Markovski, “Shapeless Quasigroups Derived by Feistel Orthomorphisms,” Glasnik Matematički, vol. 47, no. 67, pp. 333–349, 2012.

H. Michael Damm, “Totally anti-symmetric quasigroups for all orders,” Discrete Math., vol. 307, no. 6, pp. 715–729, 2007.

H. Zorkta and T. Kabani, “New Cipher Algorithm Based on Multiple Quasigroups,” International Journal of Machine Learning and Computing, vol. 1, no. 5, pp. 454–459, 2011.

Z. Pindar, S. H. Jamel, A. Disina, and M. M. Deris, “Compression function based on permutations quasigroups,” ARPN Journal of Engineering and Applied Sciences, vol. 11, no. 12, pp. 1–8, 2015.

A. H. Disina, S. Jamel, Z. A. Pindar, and M. M. Deris, “All-or-nothing key derivation function based on quasigroup string,” in International Conference on Information Science and Security (ICISS), 2006, pp. 6– 10.

C. W. Chuah, E. Dawson, and L. Simpson, “Key derivation function: the SCKDF scheme,” in Security and Privacy Protection in Information Processing Systems, L. J. Janczewski, H. B. Wolfe, and S. Shenoi, Eds. Berlin, Heidelberg: Springer, 2013, pp. 125–138.

H. Krawczyk, “Cryptographic extraction and key derivation: The HKDF scheme,” in Lect. Notes Comput. Sci., vol. 6223 LNCS, 2010, pp. 631–648.

H. Ahmad, A. Hassan, M. Saeb, and H. D. Hamed, “The ‘PYRAMIDS’ block cipher,” International Journal of Network Security, vol. 2, pp. 50–60, 2005.

J. C. H. Castro, J. M. Sierra, A. Seznec, A. Izquierdo, and A. Ribagorda, “The strict avalanche criterion randomness test,” Math. Comput. Simul., vol. 68, no. 1, pp. 1–7, 2005.

S. Ramanujam, and M. Karuppiah, “Designing an algorithm with high Avalanche Effect,” Int. J. Comput. Sci. Netw. Secur., vol. 11, no. 1, pp. 106–111, 2011.

L. E. Bassham, A. L. Rukhin, J. Soto, J. R. Nechvatal, M. E. Smid, S. D. Leigh, M Levenson, M. Vangel, N. A. Heckert, and D. L. Banks, A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. National Institute of Standard and Technology, Technology Administration, US Department of Commerce, 2010.

### Refbacks

- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.

**ISSN: 2180****-1843**

**eISSN: 2289-8131**