Development of Robust and Efficient Symmetric Random Keys Model based on the Latin Square Matrix

Main Article Content

Nada Hussein M. Ali
Mays M. Hoobi
Dunia F. Saffo

Abstract

Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a randomly predefined set of key numbers of size n via the Donald E. Knuths SRNG algorithm (subtractive method). The second phase uses the output key (or seed value) from the previous phase as input to the Latin square matrix (LSM) to formulate a new key randomly. To increase the complexity of the generated key, another new random key of the same length that fulfills Shannon’s principle of confusion and diffusion properties is XORed. Four test keys for each 128, 192,256,512, and 1024–bit length are used to evaluate the strength of the proposed model. The experimental results and security analyses revealed that all test keys met the statistical National Institute of Standards (NIST) standards and had high values for entropy values exceeding 0.98. The key length of the proposed model for n bits is 25*n, which is large enough to overcome brute-force attacks. Moreover, the generated keys are very sensitive to initial values, which increases the complexity against different attacks.

Downloads

Download data is not yet available.

Article Details

How to Cite
Ali , N. H. M., Hoobi , M. M., & Saffo , D. F. (2024). Development of Robust and Efficient Symmetric Random Keys Model based on the Latin Square Matrix. Mesopotamian Journal of CyberSecurity, 4(3), 203–215. https://doi.org/10.58496/MJCS/2024/023
Section
Articles

References

Siti Radhiah Binti Megat Azahari1, Sapiee Jamel, Muhammad Faheem Mushtaq, Shamsul Kamal Ahmad Khalid, Kamaruddin Malik Mohamad, Mustafa Mat Deris, “ Tesseract Encryption Algorithm using Latin Square of order 8 (Tea 8) ” , An international journal of advanced computer technology, vol. 9, no. 4, pp. 3617-362, 2020.

Sura Abed Sarab Hussien, Thair Abed Sarab Hussien, Mustafa Abdulsatar Noori, “ A Proposed Algorithm for Encrypted Data Hiding in Video Stream Based on Frame Random Distribution”. Iraqi Journal of Science, vol. 62, no. 9, pp: 3243-325, 2021,

Emmanuel Oluwatobi Asani, Godsfavour Biety-Nwanju, Abidemi Emmanuel Adeniyi, Salil Bharany, Ashraf Osman Ibrahim, Anas W. Abulfaraj, Wamda Nagmeldin, “Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map”, International Journal of Advanced Computer Science and Applications, vol. 14, no.9, pp. 869-877, 2023, doi: 10.14569/IJACSA.2023.0140991.

Abeer Al-Hyari, Charlie Obimbo, Mua’ad M. Abu-Faraj, Ismail Al-Taharwa, “ Generating Powerful Encryption Keys for Image Cryptography With Chaotic Maps by Incorporating Collatz Conjecture”, IEEE Access, vol. 12, pp. 4825-4844, 2024, doi: 10.1109/ACCESS.2024.3349470

Rusul Mansoor Al-Amri, Dalal N. Hamood, Alaa Kadhim Farhan, “ Theoretical Background of Cryptography ”, Mesopotamian Journal of Cybersecurity. Vol.2023, pp. 7–15, 2023, doi: https://doi.org/10.58496/MJCS/2023/002; ISSN: 2958-6542.

Keshav Sinha, Partha Paul, and Amritanjali, “ An Improved Pseudorandom Sequence Generator and its Application to Image Encryption”, KSII Transactions on Internet and Information Systems. vol. 16, no. 4, pp. 1307-1329, 2022, doi: 10.3837/tiis.2022.04.012.

D Apdilah, M K Harahap, N Khairina, A M Husein, and M Harahap, “ A Comparison of One Time Pad Random Key Generation using Linear Congruential Generator and Quadratic Congruential Generator”, Journal of Physics, Conference Series, 007, pp. 1-6, 2018, doi: 10.1088/1742-6596/1007/1/012006.

Ahmed Yousif, Ali H. Kashmar, “ Key Generator to Encryption Images Based on Chaotic Maps”, Iraqi Journal of Science, vol. 60, no. 2, pp. 362-370, 2019, doi: 10.24996/ijs.2019.60.2.16.

Bashar Adel Esttaifan, “A Modified Vigenère Cipher based on Time and Biometrics features”, Journal of Engineering, vol. 29, no. 6, pp. 128-139, 2023, doi: https://doi.org/10.31026/j.eng.2023.06.10.

Adi A. Maaita, Hamza A. A. Al_Sewadi, “Deterministic Random Number Generator Algorithm for Cryptosystem Keys”. International Journal of Computer and Information Engineering, vol. 9, no. 4, pp. 972-977, 2015.

Jie Zhou, Nan-Run Zhou, Li-Hua Gong, “ Fast color image encryption scheme based on 3D orthogonal Latin squares and matching matrix”, Optics and Laser Technology, vol., no. 131, pp. 1-14, 2020, doi: org/10.1016/j.optlastec.2020.106437.

Sumit A. Bhagat, Prashant M. Kakade, “ Efficient Route Optimization using Distance Matrices for Generation of Latin Square”, International Journal of Advanced Research in Computer and Communication Engineering, vol. 6, no.1, pp. 380-382, 2017, doi: 10.17148/IJIREEICE.2018.6.

Honglian Shen, Xiuling Shan, Ming Xu, and Zihong Tian, “ A new chaotic image encryption algorithm based on transversals in a Latin square”, Entropy, vol 24, no. 11, pp. 1-19, 2022, doi: 10.3390/e24111574.

Madhu Sharma, Ranjeet K. Ranjan, Vishal Bharti, “ A pseudo-random bit generator based on chaotic maps enhanced with a bit-XOR operation”, Journal of Information Security and Applications, vol. 69, 2022, doi: org/10.1016/j.jisa.2022.103299.

Fatima Faiz Saleh, Nada Hussein M. Ali, “ Generating Streams of Random Key Based on Image Chaos and Genetic Algorithm”, Iraqi Journal of Science, vol.63, no. 8, pp.3652-3661, 2022. doi https://doi.org/10.24996/ijs.2022.63.8.39%20.

Sungju Park, Kyungmin Kim, Keunjin Kim and Choonsung Nam, “ Dynamical Pseudo-Random Number Generator Using Reinforcement Learning”, Applied Science, vol. 12, no. 7, pp. 1-7, 2022, doi: org/10.3390/app12073377.

Balsam Abdulkadhim Hameedi, Anwar Abbas Hattab, Muna M. Laftah, “A Pseudo-Random Number Generator Based on New Hybrid LFSR and LCG Algorithm”, Iraqi Journal of Science, vol. 63, no. 5, pp. 2230-2242, 2022, doi: https://doi.org/10.24996/ijs.2022.63.5.35.

Yucheng Chen, Huiqing Huang, Chunming Tang, and Weiming Wei, “A novel adaptive image privacy protection method based on Latin square”, Nonlinear Dynamics, Vol. 112, pp:10485–10508, (2024). https://doi.org/10.1007/s11071-024-09580-1.

Guanghui Cao, Yuan Tao, Xiang Liu, and Tianxu Zhang, “Image Encryption Based on a Coined Chaotic System and High-Intensity Encryption Primitives”, IEEE access, pp: 92043-92061, 2024. doi:10.1109/ACCESS.2024.3423691

Marek Sys, Zden Riha, Vashek Matyas, “ NIST Statistical Test Suite result interpretation and optimization”, Conference: SantaCrypt At: Prague 2015, pp. 14- 17, 2015.

Mays M. Hoobi, “Multilevel Cryptography Model using RC5, Twofish, and Modified Serpent Algorithms”, Iraqi Journal of Science, vol. 65, no. 6, pp. 3434-3450, 2024, doi: https://doi.org/10.24996/ijs.2024.65.6.37.

Ankita Bisht, Mohit Dua, Shelza Dua, and Priyanka Jaroli, “ A Color Image Encryption Technique Based on Bit-Level Permutation and Alternate Logistic Maps”, J. Intell. Syst., vol. 29, no. 1, pp. 1246-1260, 2020, doi: org/10.1515/jisys-2018-0365.

Loay E. George, Enas Kh. Hassan, Sajaa G. Mohammed, Faisal G. Mohammed, “Selective Image Encryption Based on DCT, Hybrid Shift Coding, and Randomly Generated Secret Key”, Iraqi Journal of Science, vol. 61, no. 4, pp. 920-935, 2020, doi: 10.24996/ijs.2020.61.4.2.

Maria Imdad, Sofia Najwa Ramli and Hairulnizam Mahdin, “An Enhanced Key Schedule Algorithm of PRESENT-128 Block Cipher for Random and Non-Random Secret Keys”, Symmetry, vol. 14, no. 3, pp. 1-22, 2022, doi: org/10.3390/sym14030604.

Mohit Dua, Aishwarya Wesanekar, Vishwas Gupta, Mayank Bhola, and Shelza Dua, “Differential evolution optimization of intertwining logistic map‑DNA based image encryption technique”, Journal of Ambient Intelligence and Humanized Computing, vol. 11, pp.3771–3786, 2020, doi:10.1007/s12652-019-01580-z.

W. K. Jummar, A. M. Sagheer, and H. M. Saleh, “Authentication System Based on Fingerprint Using a New Technique for ROI selection ”, Babylonian Journal of Artificial Intelligence, vol. 2024, pp. 102–117, Aug. 2024.

M. Sheela, R. Suganthi, S. Gopalakrishnan, T. Karthikeyan, K. J. Jyothi, and K. Ramamoorthy, “Secure Routing and Reliable Packets Transmission In MANET Using Fast Recursive Transfer Algorithm”, BJN, vol. 2024, pp. 78–87, Jun. 2024.

S. N. Tambe-Jagtap, “A Survey of Cryptographic Algorithms in Cybersecurity: From Classical Methods to Quantum-Resistant Solutions”, SHIFRA, vol. 2023, pp. 43–52, Jun. 2023, doi: 10.70470/SHIFRA/2023/006.