Technology to limit the available number of chosen-plaintext
- Published
- Accepted
- Subject Areas
- Cryptography, Security and Privacy
- Keywords
- CPA, chosen-plaintext, cryptanalysis, linear cryptanalysis, plaintext, KPA, differential cryptanalysis, Known-plaintext
- Copyright
- © 2016 Kazawa
- Licence
- This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Preprints) and either DOI or URL of the article must be cited.
- Cite this article
- 2016. Technology to limit the available number of chosen-plaintext. PeerJ Preprints 4:e2534v2 https://doi.org/10.7287/peerj.preprints.2534v2
Abstract
This technology sets an upper limit on the number of available pairs for chosen-plaintext and ciphertext in any chosen-plaintext-attack (CPA).By applying the typical implementation of 128-bit encryption, all CPAs cannot use more than 16 chosen-plaintexts.It does not encrypt the plaintext directly with this technique.256 kinds of variations are created from the plaintext.
It then chooses one variation at random to encrypt.
Unless the encryption key is used in decryption, it is impossible to find out which of the 256 kinds of variations was used for the ciphertext.
A CPA when used for multiple chosen-plaintexts would need to repeat the comparison for the total amount of combinations of the chosen-plaintext.If the CPA increases the total amount of chosen-plaintexts by one, the number of generated encryption keys increased by 256 times.256^{16} (== 2^{128}) encryption keys will be generated from the 16 chosen-plaintexts.Since the the total key possibilities generated exceed the total number of encryption keys, it is not possible for CPA to win with a brute force attack.RC4 is no longer recommended.However, the compactness of RC4 in embedded devices (e.g. RF-ID) has a big advantage in regards to block ciphers such as AES.
Secret Key Size(bit length) / Variations Count(bit length) > Chosen Plaintexts Count(useable count)
** Industrial significance **
RC4 is no longer recommended.
However, the compactness of RC4 in embedded devices (e.g. RF-ID) has a big advantage in regards to block ciphers such as AES.
RC4 can regain its security with this technology.
Compacting embedded devices will lead mainly to the reduction of costs.
It is believed that this technology will contribute greatly to the IoT.
”XORveR”, is this technologies codename.
Author Comment
1. insert "Figure 6" into "3.3 Verification"
2. insert "Q&A1" into "4 DISCUSSION-1"
Supplemental Information
Latex source, and images
Figure 1. An RNSM image.
# An array of random number sequences (RNS) are defined in advance.
Figure 2. An RNSI create.
# Using a random number generator (RNG) will get the RNSI.
Figure 3. Select one of RNSM.
# Get the RNSM index of the RNS.
Figure 4. The camouflage plaintext create.
# With the XOR operation of plaintext and RNS, generate a camouflage plaintext.
Figure 5. The CMPT create.
# Create a CMPT by combining camouflage plaintext with RNSI.
Figure 6. a CPA activity.
# The common operation for a CPA is the decryption process.
Figure 7. encryption keys count.
# If a CPA requires the M chosen-plaintext, the number of encryption keys will reach 256M.
# All CPAs will need to check whether the decryptions generated with the encryption keys are correct.
Figure 8. CMPT for each part.
# Generating a CMPT from diving plaintext into non-predefined lengths is thought of as one way to stop it.