Implicit Initialization Vector (IV) for Counter-Based Ciphers in Encapsulating Security Payload (ESP)

2020 ◽  
Author(s):  
D. Migault ◽  
T. Guggemos ◽  
Y. Nir
Author(s):  
Tchahou Tchendjeu A. E ◽  
Tchitnga Robert ◽  
Fotsin Hilaire B

<p>This paper presents the Design and implementation into Field ProgrammableGate Array (FPGA) of a combine stream cipher and a simple linear congruential generator circuit to produce key stream. The LCG circuit is used to produce initialization vector (IV) each 2<sup>64</sup> clock cycle to the cipher trivium in other to strengthen the complexity of the cipher to known attacks on trivium. The LCGTrivium is designed to generate 2<sup>144</sup> bits of keystream from an 80-bits secret and a variable 80-bits initial value. To implement the LCG-Trivium on FPGA, we use VHDL to build a simple LCG and Trivium and a state machine to synchronize the functioning of the LCG and Trivium. The number of gates, memory and speed requirement on FPGA is giving after analysis. The design is simulated, synthesized and implemented in Quartus II 10.1, ModelSim-Altera 6.5 and Cyclone IV E EP4CE115F29C7N.</p>


2019 ◽  
Vol 8 (3) ◽  
pp. 1854-1857

Random numbers are essential to generate secret keys, initialization vector, one-time pads, sequence number for packets in network and many other applications. Though there are many Pseudo Random Number Generators available they are not suitable for highly secure applications that require high quality randomness. This paper proposes a cryptographically secure pseudorandom number generator with its entropy source from sensor housed on mobile devices. The sensor data are processed in 3-step approach to generate random sequence which in turn fed to Advanced Encryption Standard algorithm as random key to generate cryptographically secure random numbers.


Author(s):  
Mahidhara Reddy Kankara

Abstract: Elections make a fundamental contribution to democratic governance but a lack of trust among citizens on their electoral system is a hindrance to satisfy the legal requirements of legislators. Even the world’s largest democratic countries suffer from issues like vote rigging, election manipulation and hacking of the electronic voting machines in the current voting system. To provide data security for e-Voting systems, the advanced encryption standard (AES) algorithm has been proposed, but traditional AES gives the same ciphertext for every similar pair of key and plaintext. So, to eliminate these disadvantages, AES in Galois-counter mode (GCM) has been used to obtain different ciphertexts all the time by using Initialization Vector. The fingerprint data from each user is verified using Internet of Things (IoT) based Biometric system which also helps to avoid Plural Voting. The whole data is encrypted and stored in the cloud, and it can be decrypted by authorized personnel to obtain the final vote count. So, the proposed model will enhance transparency and maintain anonymity of the voters alongside providing an easily accessible secured voting system. Keywords: Advanced encryption standard, initialization vector, additional authenticated data, galois-counter mode, biometrics, security, ciphertext, authtag


Author(s):  
F. Shinasilova

Апаратты технологияларды дамуы компьютерлк желлерд сенмд трде жмыс стеун жоарылату тапсырмасын ала ояды. Желлерд аупсздгн зерттеу шн жел арылы апаратты ресурстарды жберу барысында желлк хаттамаларды, желлк архитектураларды, аупсздкт ныайту тслдерн руды зерттеу ажет. Желлк шабуылдар, стен шыу, желлк рылыларды стен шыуы сымсыз желлерде апаратты тарату барысында аупсздкке сер ететн негзг факторлар болып табылады. Бл маалада сымсыз желлерде апараттарды оралуын амтамасыз ететн дстер, соны шнде аутентификация, шифрлену жне аупсздкт амтамасыз ететн стандарттар арастырылан. аупсздкт брнеше стандарттары бар, бра бл маалада сол стандарттарды тимдлг мен стандарттарда олданылатын клттерд жмыс стеу принциптер айындалан. Сонымен атар, млметтерд пиялыы мен ттастыын амтамасыз ететн стандарттарды жмыс стеу аидасы аныталан. Яни, TKIP хаттамасы рбр тасымалданатын млметтер пакет шн жаа пия клтт генерациялайды жне бр статистикалы WEP клт шамамен 500 миллиард ммкн болатын клттерге алмастырылады. Ол осы млметтер пакетн шифрлеу шн олданылу ммкн. Клтт генерациялау механизм згертлген. Ол ш компоненттен трады: 128 битт зындыы бар базалы клт(ТК), тасымалданатын пакетт номер(TSC) пен тасымалдаушы рылыны МАС-адрес(ТА). Сонымен атар, TKIP-те инициализациялауды 48 разрядты векторы олданылады. Ол IV векторын айта-айта олдану жадайын туызбау шн олданылады. TKIP алгоритм 48 битт зындыы бар (TSC) пакет есебн олданылады. Ол рдайым артып отырады. Ал, 16 битт TSC жаа IV енгзлед(Сурет 4). Осылайша, шабуылдара тосауыл бола алатын механизм алыптасады. The development of information technology sets the task of improving the reliability of computer networks. To study the security of networks, it is necessary to study the creation of network protocols, network architectures, and ways to strengthen security when transmitting information resources over a network. Network attacks, failures, and the failure of network devices are key factors affecting the security of information transmission in wireless networks.This article discusses methods for protecting information in wireless networks, including standards for authentication, encryption, and security. There are several security standards, but this article describes the effectiveness of those standards and the key principles used in those standards. It also outlines the principles of standards that ensure the confidentiality and integrity of data. That is, the TKIP protocol generates a new secret key for each packet of data transmitted, and one static WEP key is exchanged for about 500 billion possible keys. It can be used to encrypt this data set. The key generation mechanism has been modified. It consists of three components: a 128-bit Basic Key (TC), a packet number (TSC) and a MAC address of the carrier. The TKIP also uses a 48-bit initialization vector. It is used to prevent repeated use of vector IV. The TKIP algorithm uses a 48-bit (TSC) packet calculation. It keeps increasing. Well, the new 16-bit TSC IV is introduced (Figure 4). Thus, a mechanism is created that can block attacks.


Cryptography ◽  
2018 ◽  
Vol 2 (4) ◽  
pp. 42
Author(s):  
Jonathan Trostle

In some wireless environments, minimizing the size of messages is paramount due to the resulting significant energy savings. We present CMCC (CBC-MAC-CTR-CBC), an authenticated encryption scheme with associated data (AEAD) that is also nonce misuse resistant. The main focus for this work is minimizing ciphertext expansion, especially for short messages including plaintext lengths less than the underlying block cipher length (e.g., 16 bytes). For many existing AEAD schemes, a successful forgery leads directly to a loss of confidentiality. For CMCC, changes to the ciphertext randomize the resulting plaintext, thus forgeries do not necessarily result in a loss of confidentiality which allows us to reduce the length of the authentication tag. For protocols that send short messages, our scheme is similar to Synthetic Initialization Vector (SIV) mode for computational overhead but has much smaller expansion. We prove both a misuse resistant authenticated encryption (MRAE) security bound and an authenticated encryption (AE) security bound for CMCC. We also present a variation of CMCC, CWM (CMCC With MAC), which provides a further strengthening of the security bounds.


Sign in / Sign up

Export Citation Format

Share Document