IUP Publications Online
Home About IUP Magazines Journals Books Archives
     
Recommend    |    Subscriber Services    |    Feedback    |     Subscribe Online
 
The IUP Journal of Computer Sciences :
Implementation of Automatic Variable Key with Chaos Theory and Studies Thereof
:
:
:
:
:
:
:
:
:
 
 
 
 
 
 
 

Automatic Variable Key (AVK) has been studied as a means of time variant key towards achieving perfect security. This paper investigates the implementation of AVK with chaos theory with the existing cryptographic algorithms where it is not necessary to exchange the session key in sessions other than the first session. The initial key is generated using the concept of chaos theory and the key so generated is exchanged between the sender and the receiver by public key. Thereafter, the key of each of other sessions is made to change as a function of data of plaintext as in normal AVK. An experiment was performed to study the differential attack in normal cipher, cipher with normal AVK and cipher with AVK with chaos theory. The findings revealed that the differential attack was minimum in the case of cipher with AVK with chaos theory. The reduction of differential attack was due to the application of chaos theory in the initial key generation.

 
 
 

Research investigation for achieving perfect security is a great challenge. Realization of the time variant key, key varying from session to session, theorized by Shannon (1949) for perfect security, is yet to be done. However, a partial implementation is studied elsewhere (Bhunia et al., 2005) by application of the Automatic Variable Key (AVK) in which a key is made to vary from session to session. In AVK, session key is made to vary from session to session based on the data under different algorithm (Prasun et al., 2007; and Prasun et al., 2008). Application of AVK using RSA and Data Encryption Standard (DES) is studied where it is found that AVK reduces repetitions in cipher. This is a significant achievement in reducing the effect of differential attack. In AVK, key varies from session to session. Keys are obtained as a function of the previous data.

When data/character repeats in a message, the repetition is reflected in cipher if the key is fixed. The differential attack is due to the repeated code in cipher. To reduce the differential attack, an attempt is made to reduce the repeated code in cipher even if the original message has repeated data/character. In AVK, the repeated code is reduced by variable key(s) generated based on the previous data.

In literature, studies (for example, Jakimoski and Kocarev, 2001) have been made on the application of chaos theory in key generation and consequent cryptosystem. We propose to study the application of chaos in AVK with the intention that the abrupt variation of chaos may further reduce the effect of a differential attack.

 
 
 

Computer Sciences Journal, Business Intelligence, Enterprise Systems, Enterprise Resource Planning, Customer Relationship Management, CRM, Business Operations Management, Business Process Mining, Finite State Machine, Transactional Information System, Genetic Algorithms, Decision Making Process, Data Mining Tools, Online Analysis Processing, OLAP, Artificial Intelligence.