A True Random-Number Encryption Method Employing Block Cipher and PRNG

Yi-Li Huang1, Fang-Yie Leu1, Jian-Hong Chen1 and William Cheng-Chung Chu1

  1. Department of Computer Science, Tunghai University
    No. 1727, Section 4, Taiwan Boulevard, Taichung City, Taiwan
    {yifung, leufy, g01350027, cchu}@thu.edu.tw

Abstract

In January 1999, distributed.net collaborated with the Electronic Frontier Foundation to break a DES (i.e., Data Encryption Standard) key, spending 22 hours and 15 minutes, and implying that the DES is no longer a secure encryption method. In this paper, we propose a more secure one, called the True Random Number Encryption Method (TRNEM for short), which employs current time, true random numbers and system security codes as parameters of the encryption process to increase the security level of a system. The same plaintext file encrypted by the TRNEM at different time points generates different ciphertext files. So these files are difficult to be cracked. We also analyze the security of the DES, AES (i.e., Advanced Encryption Standard) and TRNEM, and explain why the TRNEM can effectively defend some specific attacks, and why it is safer than the DES and AES.

Key words

DES, AES, true random number, SSC, block cipher, wrapped ciphertext file

Digital Object Identifier (DOI)

https://doi.org/10.2298/CSIS130921056H

Publication information

Volume 11, Issue 3 (August 2014)
Special Issue on Mobile Collaboration Technologies and Internet Services
Year of Publication: 2014
ISSN: 2406-1018 (Online)
Publisher: ComSIS Consortium

Full text

DownloadAvailable in PDF
Portable Document Format

How to cite

Huang, Y., Leu, F., Chen, J., Chu, W. C.: A True Random-Number Encryption Method Employing Block Cipher and PRNG. Computer Science and Information Systems, Vol. 11, No. 3, 905–924. (2014), https://doi.org/10.2298/CSIS130921056H