Skip to main content

Camellia Key Expansion Algorithm Based on Chaos

  • Conference paper
  • First Online:
Intelligent Data Analysis and Applications (ECC 2016)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 535))

  • 858 Accesses

Abstract

The shortage of original Camellia key generation and expansion strategy was researched. Based on these researches, the new Camellia key expansion algorithms are proposed. In this algorithms, Logistic mapping is used to reduce the dependence between subkeys. Experimental result shows that the security and robustness of the AES subkeys have been strengthened.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Aoki, K., Ichikawa, T., Kanda, M., Matsui, M., Moriai, S., Nakajima, J., Tokita, T.: Specification of Camellia – A 128-bit Block Cipher. Nippon Telegraphy and Telephone Corporation, Mitsubishi Electric Corporation, July 2000

    Google Scholar 

  2. Aoki, K., Ichikawa, T., Kanda, M., Matsui, M., Moriai, S., Nakajima, J., Tokita, T.: Camellia: a 128-bit block cipher suitable for multiple platforms - design and analysis. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, vol. 2012, pp. 39–56. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  3. Zhou, Y., Wu, W., Xu, N., Feng, D.: Differential fault attack on camellia. Chin. J. Electron. 18(1), 13–19 (2009)

    Google Scholar 

  4. Kocarev, L., Jakimoski, G., Stojanovski, T., Parlitz, U.: From chaotic maps to encryption schemes. In: Proceedings of IEEE International Symposium on Circuits and Systems 1998, vol. 4, pp. 514–517. IEEE (1998)

    Google Scholar 

  5. Zhou, H., Ling, X.T.: Generating chaotic secure sequences with desired statistical properties and high security. Int. J. Bifurcation Chaos 7(1), 205–213 (1997)

    Article  MATH  Google Scholar 

  6. Li, S.J.: Analyses and new designs of digital chaotic ciphers. Ph.D. thesis, School of Electronics and Information Engineering. Xi’an Jiaotong University, Xi’an (2003). http://www.hooklee.com/pub.html

  7. Li, C.Y., Chen, J.S., Chang, T.Y.: A chaos-based pseudo random number generator using timing-based reseeding method. In: IEEE Proceedings of ISCAS, pp. 21–24 (2006)

    Google Scholar 

  8. Hatano, Y., Sekine, H., Kaneko, T.: Higher order differential attack of camellia (II). In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 39–56. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  9. Shirai, T., Kanamaru, S., Abe, G.: Improved upper bounds of differential and linear characteristic probability for camellia. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 128–142. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  10. Zhang, L., Zhang, Y.: Research on lorenz chaotic stream cipher. In: IEEE International Workshop VLSI Design & Video Tech, pp. 431–434 (2005)

    Google Scholar 

  11. Lu, J., Kim, J.-S., Keller, N., Dunkelman, O.: Improving the efficiency of impossible differential cryptanalysis of reduced camellia and MISTY1. In: Malkin, T. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 370–386. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  12. Addabbo, T., Alioto, M., Fort, A., Pasini, A., Rocchi, S., Vignoli, V.: A class of maximum-period nonlinear congruential generators derived from the Rényi chaotic map. IEEE Trans. Circuits Syst. I 54(4), 816–828 (2007)

    Article  MathSciNet  Google Scholar 

  13. Li, G., Wang, Y., Ma, H.: Audio packet encryption of flow control base on stop-and-wait protocol. J. Inf. Hiding Multimed. Signal Process. 7(1), 127–134 (2016)

    MathSciNet  Google Scholar 

  14. Zhen, J., Zhifang, W., Zhao, B., Tang, L.: A novel super-resolution direction finding method for wideband signals based on multiple small aperture subarrays. J. Inf. Hiding Multimed. Signal Process. 7(3), 510–520 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chuanfu Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Wang, C., Ding, Q. (2017). Camellia Key Expansion Algorithm Based on Chaos. In: Pan, JS., Snášel, V., Sung, TW., Wang, X. (eds) Intelligent Data Analysis and Applications. ECC 2016. Advances in Intelligent Systems and Computing, vol 535. Springer, Cham. https://doi.org/10.1007/978-3-319-48499-0_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-48499-0_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-48498-3

  • Online ISBN: 978-3-319-48499-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics