A chaos-based approach for correcting the security level of a block cipher algorithm

  • Fatma Sbiaa
  • , Medien Zeghid
  • , Sonia Kotel
  • , Rached Tourki
  • , Mohsen Machhout
  • , Adel Baganne

Research output: Contribution to journalArticlepeer-review

2 Scopus citations

Abstract

Cryptography has become not only limited to prevent sensitive military information, but also one of the critical components of the security policy of any organization. It is considered as an industry standard for providing information trust, security, electro-financial transactions and controlling access to different resources. Related research has not stopped to improve the impact of the cryptographic algorithms. However, the cryptanalysis strived to find the potential weaknesses in the most known and secure algorithm. This is the reason why researchers have to make sure that the current algorithms are secure enough to resist against the new attacks. In this paper, a new approach for correcting the security level of a block cipher algorithm is proposed. The main goal of the present work is to provide solutions for the existing encryption algorithms which necessarily have their advantages and drawbacks. Thus, the designed algorithm must keep all the benefits presented by the main algorithm while adding improvements to the disadvantages essentially the security issues. The proposed modifications are based on the exploitation of the chaos theory properties. The experimental results showed that the proposed modifications can be easily implemented as they do not need a high level of consumption or hardware occupation. In addition, the security analysis proved the resistance of the new algorithm to statistical attacks, differential attacks, and initial key sensibility.

Original languageEnglish
Pages (from-to)92-101
Number of pages10
JournalInternational Review on Computers and Software
Volume11
Issue number2
DOIs
StatePublished - 2016
Externally publishedYes

Keywords

  • Block Cipher
  • Chaos
  • Cryptanalysis
  • Data Encryption Standard
  • Security Analysis
  • Symmetric Cryptography
  • Update Functions

Fingerprint

Dive into the research topics of 'A chaos-based approach for correcting the security level of a block cipher algorithm'. Together they form a unique fingerprint.

Cite this