A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional Operation

  • Yi-Li Huang
  • Fang-Yie Leu
  • Cheng-Ru Dai
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7465)


Currently, electronic documents are commonly exchanged between/among government offices in many countries. When a government office would like to transmit a high-security-level-electronic document to another office, the sending end officer needs to encrypt it so as to protect the document from being known to hackers. AES and DES have been commonly and widely invoked to protect documents in recent years. However, the two algorithms have so far faced the threats of Brute-Force cracks. To avoid the threats, in this study, we proposed a new data encryption approach, called the Secure Data Encryption Method (SeDEM for short), in which plaintext and system keys are encrypted by using a sequential-logic style encryption approach which further employs a three-dimensional operation and a feedback encryption mechanism to effectively protect encrypted data from brute-force and cryptanalysis attacks. The feedback encryption mechanism is a feedback process in which each of its calculation iteration generates three internally-used dynamic feedback keys for the next calculation iteration. The purpose is to effectively improve the security level and unpredictability of generated ciphertext. The three-dimensional operation is employed to further increase the computational complexity of the encryption technique so as to enhance the security level of the ciphertext, and difficulty of cracking the keys.


DES AES symmetric encryption Feedback Encryption threedimensional computing dynamic feedback keys 


  1. 1.
    Huang, Y.L., Leu, F.Y.: Constructing a Secure Point-to-Point Wireless Environment by Integrating Diffie-Hellman PKDS RSA and Stream Ciphering for Users Known to Each Other. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 2(3), 96–107 (2011)Google Scholar
  2. 2.
    Lee, S.M., Kim, D.S., Park, J.S.: A Survey and Taxonomy of Lightweight Intrusion Detection Systems. Journal of Internet Services and Information Security 2(1/2), 119–131 (2012)Google Scholar
  3. 3.
    Pandey, S.K., Barua, R.: Efficient Construction of Identity Based Signcryption Schemes from Identity Based Encryption and Signature Schemes. Journal of Internet Services and Information Security 1(2/3), 161–180 (2011)Google Scholar
  4. 4.
  5. 5.
    Yang, C.H.: Network Security: Theory and Practice. XBOOK MARKETING Co. Ltd. (September 2008) Google Scholar
  6. 6.
  7. 7.
    Hunker, J., Probst, C.W.: Insiders and insider threats—an overview of definitions and mitigation techniques. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 2(1), 4–27 (2011)Google Scholar
  8. 8.
    Huang, Y.F., Leu, F.Y., Chiu, C.H., Lin, I.L.: Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS. Journal of Universal Computer Science 17(6), 891–911 (2011)Google Scholar
  9. 9.
    Moore, A.P., Cappelli, D.M., Carony, T.C., Shaw, E., Spooner, D., Trzeciak, R.F.: A preliminary model of insider theft of intellectual property. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 2(1), 28–49 (2011)Google Scholar
  10. 10.
    Barkan, E., Biham, E.: In How Many Ways Can You Write Rijndael? In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 160–175. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  11. 11.
    Federal Information Processing Standards Publication 197. Announcing the ADVANCED ENCRYPTION STANDARD (AES) (November 26, 2001)Google Scholar
  12. 12.
    Daemen, J., Rijmen, V.: AES Proposal: Rijndael. In: The First Advanced Encryption Standard Candidate Conference (September 1999)Google Scholar
  13. 13.
  14. 14.
    Eisenbarth, T., Kumar, S., Uhsadel, L., Paar, C., Poschmann, A.: A Survey of Lightweight-Cryptography Implementations. IEEE Design & Test of Computers, 522–533 (December 2007)Google Scholar
  15. 15.
    Dworkin, M.: Recommendation for BlockCipher Modes of OperationMethods and Techniques. Natl. Inst. Stand. Technol. Spec. Publ. 800-38A 2001 ED, 66 pages (December 2001)Google Scholar
  16. 16.
    Mils Electronic, One Time Key Encryption,
  17. 17.
    Yang, F.Y., Liu, Z.W., Chiu, S.H.: Mobile Banking Payment System. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 2(3), 85–95 (2011)Google Scholar
  18. 18.
    El-Ramly, S.H., El-Garf, T., Soliman, A.H.: Dynamic Generation of S-boxes in Block Cipher Systems. In: Radio Science Conference, pp. 389–397 (August 2002)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2012

Authors and Affiliations

  • Yi-Li Huang
    • 1
  • Fang-Yie Leu
    • 1
  • Cheng-Ru Dai
    • 1
  1. 1.Department of Computer ScienceTungHai UniversityTaiwan

Personalised recommendations