Symmetric encryption with multiple keys : techniques and applications Public Deposited

http://ir.library.oregonstate.edu/concern/graduate_thesis_or_dissertations/6682x6866

Descriptions

Attribute NameValues
Creator
Abstract or Summary
  • Symmetric key block ciphers, such as AES, are well known and frequently used. There are five confidentiality modes of operation that are currently recommended for use with a symmetric key block cipher algorithm: Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR). This paper investigates extending the block cipher modes of operation using multiple symmetric keys. Unlike traditional multiple-key encryption techniques, each block of plaintext is encrypted using a single key. The key used to encrypt a block is selected by the corresponding entry of a sequence. Each sequence entry represents one of the independent keys in the set. This paper also explores a variety of applications of this technique. Possible applications include establishing a type of covert channel, customizing message encryption at the block level, and expanding a string of pseudo-random numbers. Simulations have been constructed to illustrate the concepts.
Resource Type
Date Available
Date Copyright
Date Issued
Degree Level
Degree Name
Degree Field
Degree Grantor
Commencement Year
Advisor
Academic Affiliation
Non-Academic Affiliation
Subject
Rights Statement
Language
Replaces
Additional Information
  • description.provenance : Approved for entry into archive by Linda Kathman(linda.kathman@oregonstate.edu) on 2009-05-27T16:58:56Z (GMT) No. of bitstreams: 1 Lelia_C_Barlow.pdf: 2328945 bytes, checksum: da4a6c0d221aab986811e058a1757e49 (MD5)
  • description.provenance : Made available in DSpace on 2009-05-27T17:04:41Z (GMT). No. of bitstreams: 1 Lelia_C_Barlow.pdf: 2328945 bytes, checksum: da4a6c0d221aab986811e058a1757e49 (MD5)
  • description.provenance : Submitted by Philip Vue (vuep@onid.orst.edu) on 2009-05-20T16:38:56Z No. of bitstreams: 1 Lelia_C_Barlow.pdf: 2328945 bytes, checksum: da4a6c0d221aab986811e058a1757e49 (MD5)
  • description.provenance : Approved for entry into archive by Linda Kathman(linda.kathman@oregonstate.edu) on 2009-05-27T17:04:41Z (GMT) No. of bitstreams: 1 Lelia_C_Barlow.pdf: 2328945 bytes, checksum: da4a6c0d221aab986811e058a1757e49 (MD5)

Relationships

In Administrative Set:
Last modified: 08/14/2017

Downloadable Content

Download PDF
Citations:

EndNote | Zotero | Mendeley

Items