Open Access Open Access  Restricted Access Subscription or Fee Access

Application of Logistic Equations for Generation of Symmetric Keys in Cryptography

C. Jeyamala, S. Selvameena, R. Subhasri, T.S.R. Rajanika

Abstract


Key management deals with the planning, secure generation, distribution, and storage of keys. Once a key is randomly generated, it must remain secret to avoid unfortunate mishaps and is used for encryption and decryption. Modern cryptographic systems include symmetric key algorithms and public key algorithms for the purpose of providing confidentiality. Symmetric system requires prior sharing of key; hence it is impossible to communicate with unknown users. The key generation in the symmetric crypto system has highly complicated internal structure which involves more number of iterations and cannot be supported by embedded systems and other low powered devices. Considering asymmetric systems, even though it avoids pre sharing of keys, the usage of large primes increases the time complexity of encryption and decryption and also the storage space requirement. Our proposed system for random key generation is designed using logistic equations aiming at independent generation of keys at sender and receiver with minimal parameter exchange offering the same level of security. Key generation involves the exchange of seed value, start value, skip value and precision supported by the calculating machines. The keys generated can be used as session keys which are used for very short duration of time. This enables the encryption algorithm to be as simple as possible like use of Exclusive-OR operations between keys and the plain text. Experimental results proves the efficiency of key generation exhibiting high randomness as specified by National Institute of Standards and Technology (NIST) involving less computational power in terms of time and space and with no compromise in security.

Keywords


Avalanche Effect, One Time Pads, Logistic Equation

Full Text:

PDF

References


M. A. Simpl´ıcio Jr., P. S. L. M. Barreto, C. B. Margi, and T. C. M. B. Carvalho, “A survey on key management mechanisms for distributed wireless sensor networks,” Computer Networks, 2010.

Wenbo He, Ying Huang, Ravishankar Sathyam, Klara Nahrstedt, and Whay C. Lee, “(SMOCK) A scalable method of cryptographic Key management for mission-critical Wireless ad-hoc networks”, Information Forensics and Security, IEEE Transactions, March 2009

Yan Lindsay Sun and K. J. Ray Liu, “Analysis and protection of dynamic membership information for group key distribution schemes”, Information Forensics and Security, IEEE Transactions, June 2007

Sana Tmar - Ben Hamida, Jean-Benoˆıt Pierrot, “An Adaptive Quantization Algorithm for Secret Key Generation using Radio Channel Measurements”, New Technologies, Mobility and Security (NTMS), 2009 3rd International Conference.

Y. Xiao, V. K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, “A survey of key management schemes in wireless sensor networks,” Computer Communication. 2007.

Y. Zhou, Y. Fang, and Y. Zhang, “Securing wireless sensor networks: a survey,” IEEE Communication. Surveys and Tutorials, 2008.

Apirath Limmanee and Werner Henkel, “Secure Physical-layer Key Generation Protocol and Key Encoding in Wireless Communications”, GLOBECOM Workshops, 2010 IEEE.

Ahmet M. Eskicioglu and Edward J, “A key transport protocol based on secret sharing applications to information security”, Consumer Electronics, IEEE Transactions , November 2002

Sungoh Hwang, Sergey Seleznev, and Jae Yong Lee, “New key management approach for broadcast and multicast services”, IEEE communication, February 2011

Takayuki Shimizu, Naoki, “Experimental Validation of Wireless Secret Key Agreement Using Array Antennas, General Assembly and Scientific Symposium”, 2011 XXXth URSI.

Jon Wallace, “Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits”, in IEEE International Conference on Communications (ICC 2009), 14-18 June 2009.

W. Trappe, J. Song, R. Poovendran, and K. J. R. Liu, “Key distribution for secure multimedia multicasts via data embedding,” in Proc. IEEE ICASSP, May 2001

C. Wong, M. Gouda, and S. Lam, “Secure group communications using key graphs,” IEEE/ACM Trans. Networking, February 2000.

Lifeng Lai, Yingbin Liang and Wenliang Du, “Cooperative Key Generation in Wireless Networks”, Communication, Control, and Computing (Allerton), 2011 49th Annual Allerton Conference on.

Qian Wang, Hai Su, and Kui Ren, “ Fast and Scalable Secret Key Generation Exploiting Channel Phase Randomness in Wireless Networks”, Communications, 2009. ICC '09. IEEE International Conference.

Dae Hyun Yum and Pil Joong Lee, “Exact formulae for resilience in random key pre-distribution schemes”, IEEE transactions on wireless communications, May 2012.

A. Aziz and W. Diffie, “Privacy and Authentication for Wireless Local Area Networks,” IEEE Personal Communications, vol. 1, pp. 25-31, 1994

N. Asokan and Philip Ginzboorg. Key Agreement in Ad-hoc Networks. Elsevier Preprint, 2000. To appear.

Michel Abdalla, Yuval Shavitt, and Avishai Wool. Key Management for Restricted Multicast using Broadcast Encryption. IEEE/ACM Trans. On Networking, 8(4), pp. 443--454, August 2000

M. J. Beller, L.F. Chang, and Y. Yacobi, “Privacy and Authentication on a Portable Communications System,” in Proceedings of GLOBECOM’91, pp. 1922-1927, IEEE Press, 1991

M. J. Beller, L.F. Chang, and Y. Yacobi, “Security for Personal Communication Services: Public-key vs. Private Key Approaches,” in Proceedings of Third IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC’92), pp. 26-31, IEEE Press, 1992

M. J. Beller, L.F. Chang, and Y. Yacobi, “Privacy and Authentication on a Portable Communications System,” IEEE Journal on Selected Areas in Communications, vol. 11, pp. 821-829, Aug. 1993

Steven M. Bellovin and Michael Merrit. Encrypted key exchange: Password-based protocols secure against dictionary attacks. In Proceedings of the IEEE Symposium on Research in Security and Privacy, May 1992

C.Boyd and A. Mathuria. Key Establishment Protocols for Secure Mobile Communications: A Selective Survey. Information Security and Privacy, LNCS 1438, Springer-Verlag, 1998, pp.344-355

Seungwon Lee, Seong-Min Hong, Hyunsoo Yoon and Yookun Cho. Accelerating Key Establishment Protocols for Mobile Communication.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.