Tightly Close It, Robustly Secure It: Key-Based Lightweight Process for Propping up Encryption Techniques
Securing invaluable information has been, and will be, the highest priority whether for individuals or organizations. Researchers are working diligently to meet this priority by offering different types of protection techniques. The encryption techniques
- PDF / 1,189,778 Bytes
- 24 Pages / 439.37 x 666.142 pts Page_size
- 100 Downloads / 193 Views
2
Faculty of Information Technology, American University of Madaba, Madaba, Jordan {m.almuhammed,a.daraiseh}@aum.edu.jo College of Engineering and Information Technology, Ajman University, Ajman, United Arab Emirates [email protected]
Abstract. Securing invaluable information has been, and will be, the highest priority whether for individuals or organizations. Researchers are working diligently to meet this priority by offering different types of protection techniques. The encryption techniques stand out as defacto mechanisms for ensuring proper protection for information. Many encryption techniques are available that have passed basic security tests and ensure reasonable levels of protection. The greatest challenge to these techniques is the formidably–ever–advancing cryptanalysis tools. Given this real challenge, we believe that these encryption techniques will sooner or later face the same destiny as other techniques (e.g. DES). That is, unless we keep boosting their capabilities, these techniques may fail to resist the tricky cryptanalysis tools, offering perfect opportunity for privacy–intruding lovers to threaten the information’s privacy. This paper addresses this problem by offering a specific way. In particular, it proposes a closing stage that forms an additional (and highly effective) line of defense against security attacks by concealing the final output of the encryption techniques in highly random and enormously complicated codes. This method can be integrated with any encryption technique as a final stage to increase its resistance against cryptanalysis tools. The proposed method is implemented and subjected to rigorous security testing. These tests showed that the method provides very effective camouflaging mechanisms to hide data. Keywords: Encryption techniques · Bolster encryption methods security · Key-echo generation · Hiding exploitable patterns
1
Introduction
Despite the fact that users nowadays enjoy the easiness of accessing and posting information than any time ever, they have legitimate worries about their c Springer Nature Switzerland AG 2020 K. Arai et al. (Eds.): SAI 2020, AISC 1230, pp. 278–301, 2020. https://doi.org/10.1007/978-3-030-52243-8_21
Propping up Encryption Techniques
279
sensitive information. It is true that the digital technologies have simplified the information dissemination, but do expose this information to highly hostile environment. To leverage the blessings of the digital world, it is essential to come up with protection techniques that effectively beat the hostility of the digital world and reassures the users about the privacy of their information. Encryption techniques provide effective protection mechanisms [1–14,19–22]. These techniques seem–based on the security testing that they passed–to offer a reasonable protection for information and thus mitigate the users’ worries. Although encryption techniques adopt different computational models to hide the information, they all transform their inputs in many stages with the aim that the output becomes too confusi
Data Loading...