On Constructing a Secure and Fast Key Derivation Function Based on Stream Ciphers

In order to protect electronic data, pseudorandom cryptographic keys generated by a standard function known as a key derivation function play an important role. The inputs to the function are known as initial keying materials, such as passwords, shared secret keys, and non-random strings. Existin...

Full description

Saved in:
Bibliographic Details
Main Authors: Chuah, Chai Wen, Alawatugoda, Janaka, Arbaiy, Nureize
Format: Article
Language:en
Published: ijacsa 2024
Subjects:
Online Access:http://eprints.uthm.edu.my/12461/1/J17953_a8fc286e244a612fc17de6057015fc43.pdf
http://eprints.uthm.edu.my/12461/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1833419799616552960
author Chuah, Chai Wen
Alawatugoda, Janaka
Arbaiy, Nureize
author_facet Chuah, Chai Wen
Alawatugoda, Janaka
Arbaiy, Nureize
author_sort Chuah, Chai Wen
building UTHM Library
collection Institutional Repository
content_provider Universiti Tun Hussein Onn Malaysia
content_source UTHM Institutional Repository
continent Asia
country Malaysia
description In order to protect electronic data, pseudorandom cryptographic keys generated by a standard function known as a key derivation function play an important role. The inputs to the function are known as initial keying materials, such as passwords, shared secret keys, and non-random strings. Existing standard secure functions for the key derivation function are based on stream ciphers, block ciphers, and hash functions. The latest secure and fast design is a stream cipher-based key derivation function (SCKDF2). The security levels for key derivation functions based on stream ciphers, block ciphers, and hash functions are equal. However, the execution time for key derivation functions based on stream ciphers is faster compared to the other two functions. This paper proposes an improved design for a key derivation function based on stream ciphers, namely I−SCKDF2. We simulate instances for the proposed I−SCKDF2 using Trivium. As a result, I−SCKDF2 has a lower execution time compared to the existing SCKDF2. The results show that the execution time taken by I−SCKDF2 to generate an n-bit cryptographic key is almost 50 percent lower than SCKDF2. The security of I−SCKDF2 passed all the security tests in the Dieharder test tool. It has been proven that the proposed I−SCKDF2 is secure, and the simulation time is faster compared to SCKDF2.
format Article
id my.uthm.eprints-12461
institution Universiti Tun Hussein Onn Malaysia
language en
publishDate 2024
publisher ijacsa
record_format eprints
spelling my.uthm.eprints-124612025-02-13T02:50:07Z http://eprints.uthm.edu.my/12461/ On Constructing a Secure and Fast Key Derivation Function Based on Stream Ciphers Chuah, Chai Wen Alawatugoda, Janaka Arbaiy, Nureize QA Mathematics In order to protect electronic data, pseudorandom cryptographic keys generated by a standard function known as a key derivation function play an important role. The inputs to the function are known as initial keying materials, such as passwords, shared secret keys, and non-random strings. Existing standard secure functions for the key derivation function are based on stream ciphers, block ciphers, and hash functions. The latest secure and fast design is a stream cipher-based key derivation function (SCKDF2). The security levels for key derivation functions based on stream ciphers, block ciphers, and hash functions are equal. However, the execution time for key derivation functions based on stream ciphers is faster compared to the other two functions. This paper proposes an improved design for a key derivation function based on stream ciphers, namely I−SCKDF2. We simulate instances for the proposed I−SCKDF2 using Trivium. As a result, I−SCKDF2 has a lower execution time compared to the existing SCKDF2. The results show that the execution time taken by I−SCKDF2 to generate an n-bit cryptographic key is almost 50 percent lower than SCKDF2. The security of I−SCKDF2 passed all the security tests in the Dieharder test tool. It has been proven that the proposed I−SCKDF2 is secure, and the simulation time is faster compared to SCKDF2. ijacsa 2024 Article PeerReviewed text en http://eprints.uthm.edu.my/12461/1/J17953_a8fc286e244a612fc17de6057015fc43.pdf Chuah, Chai Wen and Alawatugoda, Janaka and Arbaiy, Nureize (2024) On Constructing a Secure and Fast Key Derivation Function Based on Stream Ciphers. International Journal of Advanced Computer Science and Applications, 15 (6). pp. 1486-1493.
spellingShingle QA Mathematics
Chuah, Chai Wen
Alawatugoda, Janaka
Arbaiy, Nureize
On Constructing a Secure and Fast Key Derivation Function Based on Stream Ciphers
title On Constructing a Secure and Fast Key Derivation Function Based on Stream Ciphers
title_full On Constructing a Secure and Fast Key Derivation Function Based on Stream Ciphers
title_fullStr On Constructing a Secure and Fast Key Derivation Function Based on Stream Ciphers
title_full_unstemmed On Constructing a Secure and Fast Key Derivation Function Based on Stream Ciphers
title_short On Constructing a Secure and Fast Key Derivation Function Based on Stream Ciphers
title_sort on constructing a secure and fast key derivation function based on stream ciphers
topic QA Mathematics
url http://eprints.uthm.edu.my/12461/1/J17953_a8fc286e244a612fc17de6057015fc43.pdf
http://eprints.uthm.edu.my/12461/
url_provider http://eprints.uthm.edu.my/