{"title":"Design Large Symmetric Algorithm for Securing Big Data","authors":"O. Dawood, A. Sagheer, S. S. Al-Rawi","doi":"10.1109/DeSE.2018.00026","DOIUrl":null,"url":null,"abstract":"Today several Institutions, organizations, companies and research centers deal with hundreds of gigabytes or terabytes of the massive amount of renewable data every day. This large volume of the data requires an appropriate algorithm to protect the sensitive data that may involve credential data. These important data may contain the username and confidential password, financial accounts numbers, social security numbers, secret one-time passwords of online access or digital certificates. The various types of data need high protection from stealing, hacking or malicious actions. In this paper, we have proposed a large block cipher model by following the principles of contemporary block ciphers criteria and implemented real designing steps of algebraic ideas. The proposed cipher is considered as an extended cipher with a big size of encryption/decryption block of 512-bits and a key length of 128-bits which are expanded to reach 512-bits fit to the state matrix. This cipher is based on Substitution and Permutation Network (SPN) structure with three layers of four iterated stages similar to the Advance Encryption Standard (AES) structure, but with an extended size. A new non-linear S-Box It has adopted, new Shifting technique and a distinct mix column of order eight as well as it uses a new technique in expanding key from 128-bits to 512-bits. The proposed algorithm accepts the key length of 128-bits as the initial input of a secret key and the ciphering key is expanded from 128-bits to 512-bits for the first round and the other expanded rounds. The key scheduling technique uses two constant vectors in addition to some shifting steps and extra of XOR bit-wise operations. Therefore, the expanded ciphering key with 512-bit will be generated recursively for each round in a fixed form.","PeriodicalId":404735,"journal":{"name":"2018 11th International Conference on Developments in eSystems Engineering (DeSE)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 11th International Conference on Developments in eSystems Engineering (DeSE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DeSE.2018.00026","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
Today several Institutions, organizations, companies and research centers deal with hundreds of gigabytes or terabytes of the massive amount of renewable data every day. This large volume of the data requires an appropriate algorithm to protect the sensitive data that may involve credential data. These important data may contain the username and confidential password, financial accounts numbers, social security numbers, secret one-time passwords of online access or digital certificates. The various types of data need high protection from stealing, hacking or malicious actions. In this paper, we have proposed a large block cipher model by following the principles of contemporary block ciphers criteria and implemented real designing steps of algebraic ideas. The proposed cipher is considered as an extended cipher with a big size of encryption/decryption block of 512-bits and a key length of 128-bits which are expanded to reach 512-bits fit to the state matrix. This cipher is based on Substitution and Permutation Network (SPN) structure with three layers of four iterated stages similar to the Advance Encryption Standard (AES) structure, but with an extended size. A new non-linear S-Box It has adopted, new Shifting technique and a distinct mix column of order eight as well as it uses a new technique in expanding key from 128-bits to 512-bits. The proposed algorithm accepts the key length of 128-bits as the initial input of a secret key and the ciphering key is expanded from 128-bits to 512-bits for the first round and the other expanded rounds. The key scheduling technique uses two constant vectors in addition to some shifting steps and extra of XOR bit-wise operations. Therefore, the expanded ciphering key with 512-bit will be generated recursively for each round in a fixed form.