You are here: Home Contents V14 N2 V14N2_Barnawi.html
Personal tools

A Hive Stream Encryption (HSE): A New Stream Encryption Algorithm

 

 

Full text
View
Purchase

Source
Journal of Information Systems Security
Volume 14, Number 2 (2018)
Pages 6582
ISSN 1551-0123 (Print)
ISSN 1551-0808 (Online)
Authors
Mahmoud Barnawi — Hives System Encryption, LLC, USA
Saad Alajmi — Hives System Encryption, LLC, USA
Bin Mai — Texas A&M University, USA
Publisher
Information Institute Publishing, Washington DC, USA

 

 

Abstract

 In this paper, we present a new encryption algorithm, Hive Stream Encryption (HSE), based on stream encryption techniques. The proposed algorithm offers the strength and complexity to overcome the weaknesses and shortfall in current stream encryption methods. We present a new symmetric encryption model that encrypts/decrypts information along a path through multi-dimensional numeric space composed of cells arranged to form one encryption map. The main idea is to eliminate any mathematical relationship between the path and the encryption values in the cells in order to eliminate most of the issues inherited in the current classic stream encryption methods.

We demonstrate that in our proposed algorithm, the time it takes for a brute-force approach to identify the encryption path increase exponentially with the number of cells in the HSE map, and the number of possible key combination also increases with the map size and key size, unlike the traditional stream encryption such as AES. It illustrated that HSE is effective and efficient for data encryption.

 

 

Keywords

Stream Encryption, Hive Stream Encryption, Encryption Path, Encryption

 

 

References

Ahmad, S. M. S., Ali, B. M., and Adnan, W. A. W. (2012). Technical issues and challenges of biometric applications as access control tools of information security. International Journal of Innovative Computing, Information and Control, 8(11), 7983-7999.

Anderson, R., and Moore, T. (2006). The economics of information security. Science, 314(5799), 610-613.

Appari, A., and Johnson, M. E. (2010). Information security and privacy in healthcare: current state of research. International journal of Internet and enterprise management, 6(4), 279-314.

Bösch, C., Hartel, P., Jonker, W., and Peter, A. (2015). A survey of provably secure searchable encryption. ACM Computing Surveys (CSUR), 47(2), 18.

Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., and Baskerville, R. (2013). Future directions for behavioral information security research. Computers & Security, 32, 90-101.

Daemen, J., and Clapp, C. (1998). Fast hashing and stream Encryption with PANAMA. In Fast Software Encryption (pp. 60-74). Springer Berlin/Heidelberg.

Daemen, J., Govaerts, R., and Vandewalle, J. (1993, May). Resynchronization weaknesses in synchronous stream ciphers. In Workshop on the Theory and Application of Cryptographic Techniques (pp. 159-167). Springer, Berlin, Heidelberg.

Dlamini, M. T., Eloff, J. H., and Eloff, M. M. (2009). Information security: The moving target. Computers & security, 28(3), 189-198.

Ford, W., and Baum, M. S. (2000). Secure electronic commerce: building the infrastructure for digital signatures and encryption. Prentice Hall PTR.

Halperin, R., and Backhouse, J. (2008). A roadmap for research on identity in the information society. Identity in the information society, 1(1), 71-87.

Hammersmith, W. (2002). U.S. Patent Application No. 10/254,743.

Herath, T., and Rao, H. R. (2009). Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems, 47(2), 154-165.

Mai, B., Kulkarni, S., M. Salehan, “Vulnerability enhancement vs. loss mitigation: Optimal information security investment,” Journal of Information Systems Security, Vol. 12, No. 2, 2016

Mai, B., Parsons, T., Prybutok, V., and K. Namuduri, “Neuroscience foundations for human decisionmaking in information security: A general framework and experiment design,” in Davis, F., Riedl, R., vom Brocke, J., Leger, P., and A. Randolph, (Eds.) Information Systems and Neuroscience – Gmunden Retreat on NeuroIS 2016, Switzerland, Springer International Publishing, ISBN 978-3-319-41402-7, 2016.

Mao, W. (2003). Modern cryptography: theory and practice. Prentice Hall Professional Technical Reference.

Min, L., and Chen, G. (2013). A novel stream encryption scheme with avalanche effect. The European Physical Journal B, 86(459), 1-13.

Rogaway, P., and Coppersmith, D. (1998). A software-optimized encryption algorithm. Journal of Cryptology, 11(4), 273-287.

Rueppel, R. A. (1986). Stream ciphers. In Analysis and Design of Stream Ciphers (pp. 5-16). Springer Berlin Heidelberg.

Scarfone, K., Souppaya, M., Cody, A., and Orebaugh, A. (2008). Technical guide to information security testing and assessment. NIST Special Publication, 800, 115.

Schneier, B. (1993, December). Description of a new variable-length key, 64-bit block cipher (Blowfish). In International Workshop on Fast Software Encryption (pp. 191-204). Springer, Berlin, Heidelberg.

Stallings, W. (2006). Cryptography and network security: principles and practices. Pearson Education India.

Wang, X. Y., and Yu, Q. (2009). A block encryption algorithm based on dynamic sequences of multiple chaotic systems. Communications in Nonlinear Science and Numerical Simulation, 14(2), 574-581.

Zhang, L., Liao, X., and Wang, X. (2005). An image encryption approach based on chaotic maps. Chaos, Solitons & Fractals, 24(3), 759-765.