TY - JOUR
T1 - Fast multi-cipher transformation and its implementation for modern secure protocols
AU - Young, Chung Ping
AU - Chia, Chung Chu
AU - Lin, Yen Bor
AU - Chen, Liang Bi
PY - 2011/8/1
Y1 - 2011/8/1
N2 - This paper proposes a fast multi-cipher transformation (FMCT) scheme which enables a cryptosystem to employ multiple cipher algorithms concurrently and efficiently in a session of communication. A file can be encrypted by different cipher algorithms with diverse parameters through FMCT. We prove that a cryptosystem based on FMCT is reversible, flexible, workable and applicable in modern secure protocols. For high throughput applications based on FMCT cryptosystem, a multi-core scheduling algorithm is also proposed. Since this scheduling algorithm spans a lot of FPGA configuration files from base cipher algorithms, even if the number of base cipher algorithms is limited, a lot of configurations of cipher suits can be generated for cipher change protocol in different session of communications. Therefore, the frequency of the usage of a certain cipher algorithm is effectively reduced. No doubt, this is an alternative way to promote higher security in modern secure protocols.
AB - This paper proposes a fast multi-cipher transformation (FMCT) scheme which enables a cryptosystem to employ multiple cipher algorithms concurrently and efficiently in a session of communication. A file can be encrypted by different cipher algorithms with diverse parameters through FMCT. We prove that a cryptosystem based on FMCT is reversible, flexible, workable and applicable in modern secure protocols. For high throughput applications based on FMCT cryptosystem, a multi-core scheduling algorithm is also proposed. Since this scheduling algorithm spans a lot of FPGA configuration files from base cipher algorithms, even if the number of base cipher algorithms is limited, a lot of configurations of cipher suits can be generated for cipher change protocol in different session of communications. Therefore, the frequency of the usage of a certain cipher algorithm is effectively reduced. No doubt, this is an alternative way to promote higher security in modern secure protocols.
UR - http://www.scopus.com/inward/record.url?scp=80052469534&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=80052469534&partnerID=8YFLogxK
M3 - Article
AN - SCOPUS:80052469534
VL - 7
SP - 4941
EP - 4954
JO - International Journal of Innovative Computing, Information and Control
JF - International Journal of Innovative Computing, Information and Control
SN - 1349-4198
IS - 8
ER -