Abstract
In a cryptosystem, a cipher's security is directly dependent on a key-schedule or key-scheduling algorithm (KSA) or that is used for both encryption and decryption. The random-number-based KSA adds another layer of security and prevents hackers from performing cryptanalysis. Several previous studies have investigated the strength of a cipher's encryption process. The strength evaluation of the key-scheduling process has received less attention that can lead to weaknesses in the overall encryption process. This paper proposes a new framework consisting of cryptographic strength evaluation criteria for random number generators (RNG)-based KSAs. Our framework (CryptoQNRG) evaluates different key-schedules based on pseudorandom and quantum random number generators with a set of tests. There are test suites that compare the strength of KSAs for different block ciphers. To the best of our knowledge this is the first time that a framework is built to compare the strength of KSAs incorporating RNGs and various block ciphers. CryptoQNRG comprises of four tests: Frequency, Bit_Correlation, Bit_Interfold, and Bit_Entropy. The tests are used to explore cryptographic properties such as unpredictability, balance of bits, correlation, confusion, and diffusion in the subkeys generated by the RNG-based KSA. We have evaluated the most common KSAs with different block ciphers and a significant outcome of the proposed framework is the distinction between strong and weak RNG-based KSAs.
Similar content being viewed by others
Data availability
The data used to support the findings of this study are included in this article.
References
Stallings W (2005) Cryptography and network security: principles and practices. Pearson, New York
Verma K, Sharma DK (2017) Calculation of non-linearity and algebraic degree of constructed boolean function. In: 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), pp 501–505. https://doi.org/10.1109/RTEICT.2017.8256647
Shi FL, Bin H (2010) Propagation properties of symmetric Boolean functions. In: International Conference on Intelligent Computation Technology and Automation, pp 947–950. https://doi.org/10.1109/ICICTA.2010.614
Biryukov A, Khovratovich D (2009) Related-key cryptanalysis of the full AES-192 and AES-256. In: Advances in Cryptology—ASIACRYPT Lecture Notes in Computer Science. Springer, Berlin, pp 1–18
Jithendra KB, Shahana TK (2018) New results in related key impossible differential cryptanalysis on reduced round AES-192. In: 2018 International Conference On Advances in Communication and Computing Technology, ICACCT 2018, pp 291–295. https://doi.org/10.1109/ICACCT.2018.8529666.
Biham E, Shamir A (1991) Differential cryptanalysis of DES-like cryptosystems. J Cryptol 4(1):3–72. https://doi.org/10.1007/BF00630563
Smart NP, Rijmen V, Warinschi B, Watson G (2021) Algorithms, key sizes and parameters report. Report. ENISA, Nov. 2014. https://www.enisa.europa.eu/publications/algorithms-key-size-and-parameters-report-2014. Accessed 09 Sep 2021
Lee J, Seo Y, Heo J (2018) Analysis of random number generated by quantum noise source and software entropy source. In: Proceedings of the International Conference on Information and Communication Technology Convergence (ICTC). IEEE, Jeju, Korea (South), pp 729–732. https://doi.org/10.1109/ICTC.2018.8539618
Herrero-Collantes M, Garcia-Escartin JC (2017) Quantum random number generators. Rev Mod Phys 89(1):015004. https://doi.org/10.1103/RevModPhys.89.015004
Lunghi T et al (2015) Self-testing quantum random number generator. Phys Rev Lett 114(15):150501. https://doi.org/10.1103/PhysRevLett.114.150501
Xu H, Perenzoni D, Tomasi A, Massari N (2018) A 16 × 16 pixel post-processing free quantum random number generator based on SPADs. IEEE Trans Circuits Syst II Express Briefs 65(5):627–631. https://doi.org/10.1109/TCSII.2018.2821904
Pooser RC, Evans PG, Humble TS (2013) Self correcting quantum random number generators using tapered amplifiers. In: Proceedings of the IEEE Photonics Society Summer Topical Meeting Series. IEEE, Waikoloa, HI, USA, pp 147–148. https://doi.org/10.1109/PHOSST.2013.6614471
Wang JM, Xie TY, Zhang HF, Yang DX, Xie C, Wang J (2015) A bias-free quantum random number generation using photon arrival time selectively. IEEE Photonics J. https://doi.org/10.1109/JPHOT.2015.2402127
Li Y-H et al (2019) Quantum random number generation with uncharacterized laser and sunlight. npj Quantum Inf 5(1):97. https://doi.org/10.1038/s41534-019-0208-1
Abellán C et al (2014) Ultra-fast quantum randomness generation by accelerated phase diffusion in a pulsed laser diode. Opt Express 22(2):1645. https://doi.org/10.1364/oe.22.001645
ID Quantique (2020). What is the Q in QRNG ? Accessed 07 Jul 2020. https://www.idquantique.com/random-number-generation/overview/
Shaw G., Sivaram SR, Prabhakar A (2019) Quantum random number generator with one and two entropy sources. In: Proceedings of the National Conference on Communications (NCC). IEEE, Bangalore, India, pp 1–4. https://doi.org/10.1109/NCC.2019.8732222
Mogos G (2016) Quantum random number generator vs. random number generator. In: IEEE International Conference on Communications, pp 423–426. https://doi.org/10.1109/ICComm.2016.7528306.
ID Quantique (2020) Understanding quantum cryptography. ID Quantique SA. https://www.idquantique.com/quantum-safe-security/quantum-key-distribution/. Accessed 07 Jul 2020
IDQ (2020) Quantum versus classical random number generators. Switzerland.
ID Quantique (2020) Gaming-and-lotteries. https://www.idquantique.com/random-number-generation/applications/gaming-and-lotteries/. Accessed 07 Jul 2020
Chatzimichailidou MM, Dokas IM (2018) RiskSOAP: on the relationship between systems safety and the risk SA provision capability. IEEE Syst J 12(2):1148–1157. https://doi.org/10.1109/JSYST.2016.2614953
Socha P, Miskovsky V, Kubatova H, Novotny M (2017) Optimization of Pearson correlation coefficient calculation for DPA and comparison of different approaches. In: International Symposium on Design and Diagnostics of Electronic Circuit and Systems, pp 184–189. https://doi.org/10.1109/DDECS.2017.7934563
T. S. Community. Hamming. https://docs.scipy.org/doc/scipy/reference/generated/scipy.spatial.distance.hamming.html. Accessed 09 Jul 2020
Volchok E (2020) Clear-sighted statistics: module 14: one-sample hypothesis tests (slides). City University of New York (CUNY), New York
Hakim AR, Nusron ZZ (2019) An improved Lblock-s key schedule algorithm. In: International Conference on Information and Communications Technology, pp 232–236. https://doi.org/10.1109/ICOIACT46704.2019.8938569
Kareem SM, Rahma AMS (2020) A novel approach for the development of the Twofish algorithm based on multi-level key space. J Inf Secur Appl. https://doi.org/10.1016/j.jisa.2019.102410
Sulaiman S, Muda Z, Juremi J, Mahmod R, Yasin SM (2013) A new shiftcolumn transformation : an enhancement of Rijndael key scheduling. Int J Cyber-Secur Digit Forensics (IJCSDF) 1(3):160–166
Huang J, Yan H, Lai X (2017) Transposition of AES key schedule. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol 10143. LNCS, pp 84–102. https://doi.org/10.1007/978-3-319-54705-3_6
Shahzadi R, Anwar SM, Qamar F, Ali M, Rodrigues JJPC (2019) Chaos based enhanced RC5 algorithm for security and integrity of clinical images in remote health monitoring. IEEE Access. https://doi.org/10.1109/ACCESS.2019.2909554
Sahmoud S, Elmasry W, Shadi A (2013) Enhancement the security of AES against modern attacks by using variable key block cipher. Int Arab J e-Technol 3(1):17–26
Maram B, Gnanasekar JM (2018) A block cipher algorithm to enhance the avalanche effect using dynamic key-dependent S-box and genetic operations. Int J Pure Appl Math 119(10):399–418
Saha R, Geetha G, Kumar G, Kim TH (2018) RK-AES: an improved version of AES using a new key generation process with random keys. Secur Commun Netw 2018:1–11. https://doi.org/10.1155/2018/9802475
Vuppala A, Roshan RS, Nawaz S, Ravindra JVR (2020) An efficient optimization and secured triple data encryption standard using enhanced key scheduling algorithm. Procedia Comput Sci 171:1054–1063. https://doi.org/10.1016/j.procs.2020.04.113
Leurent G, Pernot C (2021) New representations of the AES key schedule. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol 12696. LNCS, pp 54–84, 2021. https://doi.org/10.1007/978-3-030-77870-5_3
May L, Henricksen M, Millan W, Carter G, Dawson E (2002) Strengthening the key schedule of the AES. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol 2384, pp 226–240.https://doi.org/10.1007/3-540-45450-0_19
Afzal S, Yousaf M, Afzal H, Alharbe N, Mufti MR (2020) Cryptographic strength evaluation of key schedule algorithms. Secur Commun Netw. https://doi.org/10.1155/2020/3189601
Afzal S, Waqas U, Mir MA, Yousaf M (2015) Statistical analysis of key schedule algorithms of different block ciphers. Science International—Report
Vajapeyam S (2014) Understanding Shannon’s entropy metric for information, pp 1–6. https://doi.org/10.48550/arXiv.1405.2061
G. J. Croll, “Bientropy, TriEntropy and primality,” Entropy, vol. 22, no. 3, Mar. 2020, doi: https://doi.org/10.3390/e22030311.
Daemen J, Rijmen V (2002) The design of Rijndael. Springer, Berlin
Gullasch D, Bangerter E, Krenn S (2011) Cache games—bringing access-based cache attacks on AES to practice. In: IEEE Symposium on Security and Privacy, pp 490–505. https://doi.org/10.1109/SP.2011.22
Biryukov A, Cannière C (1999) Data encryption standard (DES). In: Encyclopedia of Cryptography and Security. Springer, Boston. https://doi.org/10.1007/0-387-23483-7_94
Adams C (1997) The CAST-128 encryption algorithm. Accessed 12 Jun 2021. https://www.rfc-editor.org/info/rfc2144
Japan’s First 128-bit Block Cipher ‘Camellia’ Approved as a New Standard Encryption Algorithm in the Internet. NTT News Release. https://www.ntt.co.jp/news/news05e/0507/050720.html. Accessed 17 Jul 2021
Cannière C (2011) GOST encyclopedia of cryptography and security. Springer, Boston. https://doi.org/10.1007/978-1-4419-5906-5_579
Courtois NT, Gawinecki JA, Song G (2013) Contradiction immunity and guess-then-determine attacks on GOST. Tatra Mt Math Publ 53(1):65–79. https://doi.org/10.2478/v10127-012-0039-3
“Cryptol.” Galois, Inc. https://cryptol.net/
IDQ (2020) quantis-random-number-generator. https://www.idquantique.com/random-number-generation/products/quantis-random-number-generator. Accessed 07 Jul 2020
Anandakumar NN, Dillibabu S (2012) Correlation power analysis attack of AES on FPGA using customized communication protocol. In: International Conference on Computational Science, Engineering and Information Technology, pp 683–688. https://doi.org/10.1145/2393216.2393330.
Niu Y, Zhang J, Wang A, Chen C (2019) An efficient collision power attack on AES encryption in edge computing. IEEE Access 7:18734–18748. https://doi.org/10.1109/ACCESS.2019.2896256
Li Y, Chen M, Liu Z, Wang J (2016) Reduction in the number of fault injections for blind fault attack on SPN block ciphers. ACM Trans Embed Comput Syst 16(2):1–20. https://doi.org/10.1145/3014583
Funding
This research work received funding by University of Hertfordshire, UK.
Author information
Authors and Affiliations
Contributions
AS and AT devised the idea presented here. AS developed the theory, performed the computations, and prepared figures. RK and AS verified the analytical methods. All authors reviewed the manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Saini, A., Tsokanos, A. & Kirner, R. CryptoQNRG: a new framework for evaluation of cryptographic strength in quantum and pseudorandom number generation for key-scheduling algorithms. J Supercomput 79, 12219–12237 (2023). https://doi.org/10.1007/s11227-023-05115-4
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-023-05115-4