A True Random-Number Encryption Method Employing Block Cipher and PRNG
- Department of Computer Science, Tunghai University
No. 1727, Section 4, Taiwan Boulevard, Taichung City, Taiwan
{yifung, leufy, g01350027, cchu}@thu.edu.tw
Abstract
In January 1999, distributed.net collaborated with the Electronic Frontier Foundation to break a DES (i.e., Data Encryption Standard) key, spending 22 hours and 15 minutes, and implying that the DES is no longer a secure encryption method. In this paper, we propose a more secure one, called the True Random Number Encryption Method (TRNEM for short), which employs current time, true random numbers and system security codes as parameters of the encryption process to increase the security level of a system. The same plaintext file encrypted by the TRNEM at different time points generates different ciphertext files. So these files are difficult to be cracked. We also analyze the security of the DES, AES (i.e., Advanced Encryption Standard) and TRNEM, and explain why the TRNEM can effectively defend some specific attacks, and why it is safer than the DES and AES.
Key words
DES, AES, true random number, SSC, block cipher, wrapped ciphertext file
Digital Object Identifier (DOI)
https://doi.org/10.2298/CSIS130921056H
Publication information
Volume 11, Issue 3 (August 2014)
Special Issue on Mobile Collaboration Technologies and Internet Services
Year of Publication: 2014
ISSN: 2406-1018 (Online)
Publisher: ComSIS Consortium
Full text
Available in PDF
Portable Document Format
How to cite
Huang, Y., Leu, F., Chen, J., Chu, W. C.: A True Random-Number Encryption Method Employing Block Cipher and PRNG. Computer Science and Information Systems, Vol. 11, No. 3, 905–924. (2014), https://doi.org/10.2298/CSIS130921056H