当前位置: X-MOL 学术Int. J. Syst. Assur. Eng. Manag. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
A novel approach of asymmetric key generation in symmetric AES via ECDH
International Journal of System Assurance Engineering and Management Pub Date : 2020-08-25 , DOI: 10.1007/s13198-020-01029-z
Sameer Farooq , Priyanka Chawla

AES and ECC are considered as the best encryption algorithms, both are approved by NIST and are regarded as next generation algorithm. It is believed that they are quantum computer resistant. The compact ciphertext size of ECC and AES makes them the best choice for cloud computing, sensor networks or small devices where we want resource-saving without compromising the security of the system. But the main issue with AES is key sharing, which is dependent on the secured channel and if that channel gets compromised the communication will also get compromised. To overcome this issue, we are proposing the novel concept, which is generating keys for both AES and ECC using the proposed methodology given in the paper. The algorithm does not need a secured channel at any level as it is inheriting properties of the ECDH algorithm and adding novel concepts with it for key generation. We have observed from the experimental results that our proposed algorithm generates 16-byte key which is inheriting ECC property, so it can with stand with prime factorization attack and QC. The other property is that the key generation algorithm is lesser complex as compared to the existing related algorithms.



中文翻译:

通过ECDH在对称AES中生成非对称密钥的新方法

AES和ECC被认为是最好的加密算法,均已获得NIST的认可并被视为下一代算法。据信它们是量子计算机抗性的。ECC和AES的紧凑密文大小使其成为我们想要节省资源而不损害系统安全性的云计算,传感器网络或小型设备的最佳选择。但是AES的主要问题是密钥共享,它取决于安全通道,如果该通道受到损害,则通信也将受到损害。为了克服这个问题,我们提出了一种新颖的概念,即使用本文给出的建议方法为AES和ECC生成密钥。该算法不需要任何级别的安全通道,因为它继承了ECDH算法的属性并为密钥生成添加了新的概念。从实验结果可以看出,我们提出的算法生成了16字节的密钥,该密钥继承了ECC属性,因此可以与质数分解攻击和QC一起使用。另一个特性是,与现有的相关算法相比,密钥生成算法的复杂度更低。

更新日期:2020-08-26
down
wechat
bug