TY - GEN
T1 - Dynamic key generation for polymorphic encryption
AU - Booher, D. Duane
AU - Cambou, Bertrand
AU - Carlson, Albert H.
AU - Philabaum, Christopher
N1 - Publisher Copyright:
© 2019 IEEE.
PY - 2019/3/12
Y1 - 2019/3/12
N2 - Frequency analysis can be effective in breaking block ciphers of very long messages encrypted with single keys, even when protected by cipher-block-chaining schemes. To mitigate these attacks, we suggest the use of polymorphic encryption methods, which leverage large numbers of independently generated keys to encrypt long messages with blocks of variable size. The generation of multiple keys, when based on pseudo random numbers, could in turn become a weak element of the scheme. In this paper, we describe a simple file encryption/decryption application that utilizes a simulated secured Physically Unclonable Function crypto table to provide independent key generation for the design of polymorphic encryption. The communicating parties can dynamically generate tens of thousands of keys; the number of which varies with the length of the plain text to encrypt. Our proposed implementation, based on PC to PC communication, is able to encrypt 1Gbyte files with 50,000 keys in about 30 seconds.
AB - Frequency analysis can be effective in breaking block ciphers of very long messages encrypted with single keys, even when protected by cipher-block-chaining schemes. To mitigate these attacks, we suggest the use of polymorphic encryption methods, which leverage large numbers of independently generated keys to encrypt long messages with blocks of variable size. The generation of multiple keys, when based on pseudo random numbers, could in turn become a weak element of the scheme. In this paper, we describe a simple file encryption/decryption application that utilizes a simulated secured Physically Unclonable Function crypto table to provide independent key generation for the design of polymorphic encryption. The communicating parties can dynamically generate tens of thousands of keys; the number of which varies with the length of the plain text to encrypt. Our proposed implementation, based on PC to PC communication, is able to encrypt 1Gbyte files with 50,000 keys in about 30 seconds.
KW - Cybersecurity
KW - PUF
KW - Physically Unclonable Function
KW - polymorphic encryption
KW - private key
KW - public key
UR - http://www.scopus.com/inward/record.url?scp=85063904703&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85063904703&partnerID=8YFLogxK
U2 - 10.1109/CCWC.2019.8666500
DO - 10.1109/CCWC.2019.8666500
M3 - Conference contribution
AN - SCOPUS:85063904703
T3 - 2019 IEEE 9th Annual Computing and Communication Workshop and Conference, CCWC 2019
SP - 482
EP - 487
BT - 2019 IEEE 9th Annual Computing and Communication Workshop and Conference, CCWC 2019
A2 - Chakrabarti, Satyajit
A2 - Saha, Himadri Nath
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 9th IEEE Annual Computing and Communication Workshop and Conference, CCWC 2019
Y2 - 7 January 2019 through 9 January 2019
ER -