Dynamic key generation for polymorphic encryption

D. Duane Booher, Bertrand Cambou, Albert H. Carlson, Christopher Philabaum

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Abstract

Frequency analysis can be effective in breaking block ciphers of very long messages encrypted with single keys, even when protected by cipher-block-chaining schemes. To mitigate these attacks, we suggest the use of polymorphic encryption methods, which leverage large numbers of independently generated keys to encrypt long messages with blocks of variable size. The generation of multiple keys, when based on pseudo random numbers, could in turn become a weak element of the scheme. In this paper, we describe a simple file encryption/decryption application that utilizes a simulated secured Physically Unclonable Function crypto table to provide independent key generation for the design of polymorphic encryption. The communicating parties can dynamically generate tens of thousands of keys; the number of which varies with the length of the plain text to encrypt. Our proposed implementation, based on PC to PC communication, is able to encrypt 1Gbyte files with 50,000 keys in about 30 seconds.

Original languageEnglish (US)
Title of host publication2019 IEEE 9th Annual Computing and Communication Workshop and Conference, CCWC 2019
EditorsSatyajit Chakrabarti, Himadri Nath Saha
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages482-487
Number of pages6
ISBN (Electronic)9781728105543
DOIs
StatePublished - Mar 12 2019
Event9th IEEE Annual Computing and Communication Workshop and Conference, CCWC 2019 - Las Vegas, United States
Duration: Jan 7 2019Jan 9 2019

Publication series

Name2019 IEEE 9th Annual Computing and Communication Workshop and Conference, CCWC 2019

Conference

Conference9th IEEE Annual Computing and Communication Workshop and Conference, CCWC 2019
Country/TerritoryUnited States
CityLas Vegas
Period1/7/191/9/19

Keywords

  • Cybersecurity
  • Physically Unclonable Function
  • polymorphic encryption
  • private key
  • public key
  • PUF

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Dynamic key generation for polymorphic encryption'. Together they form a unique fingerprint.

Cite this