›› 2012, Vol. 42 ›› Issue (05): 1257-1261.

Previous Articles     Next Articles

Format-preserving encryption for variable-length encoding character data

LI Min, JIA Chun-fu, LI Jing-wei, LIU Zhe-li, DONG Zong-qing   

  1. College of Information Technical Science, Nankai University, Tianjin 300071, China
  • Received:2011-07-16 Online:2012-09-01 Published:2012-09-01

Abstract: Two Format-Preserving Encryption (FPE) schemes suitable for variable-length encoding character data were proposed. Scheme I constructs the block cipher based on Feistel network, and combines cycle-walking to ensure that the ciphertext is in legitimate range. This scheme can be applied in FPE on short plaintext, and meets the needs of hiding the count of characters. Scheme II splits the plaintext into several sub-character sets, and then it executes the FPE of fixed-length encoding character data on each sub-set. Scheme II is more efficient and applicable to FPE on plaintext of any length.

Key words: computer systems organization, format-preserving encryption, variable-length encoding, character data, Feistel network, cycle-walking

CLC Number: 

  • TP393.08
[1] National Bureau of Standards. FIPS PUB 74. Guidelines for Implementing and Using the NBS Data Encryption Standard[S]. 1981.
[2] Spies T. Format preserving encryption[Z]. Unpublished White Paper. http://www.voltage.com, 2008.
[3] Black J, Rogaway P. Ciphers with arbitrary finite domains//Topics in Cryptology-CT-RSA'02, Springer, 2002:114-130.
[4] Spies T. Feistel finite set encryption mode. http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/ffsem/ffsem-spec.pdf,2008.
[5] Bellare M, Ristenpart T, Rogaway P, et al. Format-preserving encryption//Selected Areas in Cryptography (SAC 2009). Berlin:Springer, 2009.
[6] Bellare M, Rogaway P, Spies T. The FFX mode of operation for format-preserving encryption. http://www.csrc.nist.gov/groups/ST/toolkit/BCM/ documents/proposedmodes/ffx/ffx-spec.pdf,2011.
[7] Brier E, Peyrin T, Stern J. BPS: a format-preserving encryption proposal. http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/bps/bps-spec.pdf,2010.
[8] 刘哲理,贾春福,李经纬. 保留格式加密模型研究[J]. 通信学报, 2011,32(6): 184-190. Liu Zhe-li, Jia Chun-fu, Li Jing-wei. Research on the format-preserving encryption modes[J]. Journal on Communications, 2011,32(6) :184-190.
[9] Radhakrishnan R, Kharrazi M, Memon N. Data masking: A new approach for steganography[J]. The Journal of VLSI Signal Processing, 2005,41(3):293-303.
[10] Stütz T, Uhl A. Efficient format-compliant encryption of regular languages: block-based cycle-walking//11th IFIP TC 6/TC 11 International Conference. Springer, 2010:81-92.
[11] Liu Zhe-li, Jia Chun-fu, Li Jing-wei, et al. Format-preserving encryption for datetime//Proceedings of the 2th International Conference on Intelligent Computing and Intelligent Systems (ICIS 2010). Xiamen China, 2010:201-205.
[12] Luby M,Rackoff C.How to construct pseudorandom permutations and pseudorandom functions[J].SIAM Journal on Computing,1988,17(2):373-386.
[13] Patarin J. Security of random Feistel schemes with 5 or more rounds//Cryptology-CRYPTO'04. Berlin:Springer, 2004: 135-158.
[14] Ulf Mattsson. Format controlling encryption using datatype preserving encryption. http://eprint.iacr.org/2009/257,2009.
[15] Morris B, Rogaway P, Stegers T. How to encipher messages on a small domain//Advances in Cryptology-CRYPTO'09, 2009.
[1] DONG Jian-feng, ZHANG Yu-feng, DAI Zhi-qiang. Improved recommendation algorithm based on DPM model [J]. 吉林大学学报(工学版), 2018, 48(2): 596-604.
[2] LIU Lei, LIU Li-juan, WU Xin-wei, ZHANG Peng. Compiler testing method based on ECP metamorphic relation [J]. 吉林大学学报(工学版), 2017, 47(4): 1262-1267.
[3] DONG Li-yan, WANG Yue-qun, HE Jia-nan, SUN Ming-hui, LI Yong-li. Collaborative filtering recommendation algorithm based on time decay [J]. 吉林大学学报(工学版), 2017, 47(4): 1268-1272.
[4] DENG Chang-yi, GUO Rui-feng, ZHANG Yi-wen, WANG Hong-liang. Lower power dynamic scheduling algorithm for sporadic tasks based on balance factor [J]. 吉林大学学报(工学版), 2017, 47(2): 591-600.
[5] QIN Min, GUO Yu-kun, LI Jin-ping. Ojectionable video detecting based on multiple color space [J]. 吉林大学学报(工学版), 2013, 43(增刊1): 283-286.
[6] ZHANG Hua, PENG Lai-hu, HU Xu-dong, WANG Xian-mei. Model of enterprise cloud manufacture applying to textile machining industry [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 337-340.
[7] WANG Xin-ying, LIU Gang, GU Fang-ming, XIAO Wei. Heterogeneous feature fusion method based on semantic and shape for 3D model retrieval [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 359-363.
[8] WU Xiao-xuan, NI Zhi-wei, NI Li-ping. Clustering ensembles algorithm based on fractal dimension [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 364-367.
[9] LIU Zhuang, FANG Zhi-yi, ZHANG Chun-fei, CHEN Lin, ZHAO Yang. Energy-efficient amendatory algorithm based on energy-consumption transference and data gravitation in wireless sensor networks [J]. , 2012, 42(05): 1237-1242.
[10] LIU Xian, GUO Rui-feng, DING Wan-fu. Schedulability of rollback recovery fault-tolerant real-time system based on priority mixed strategy [J]. , 2012, 42(05): 1243-1250.
[11] CHAI Zheng-yi, WU Hui-xin, WU-Yong. Optimization algorithm for immune real-value detector generation [J]. , 2012, 42(05): 1251-1256.
[12] LIU Yan-heng, FU Feng, ZHU Jian-qi, SUN Xin. DoS detection model base on alive entropy [J]. 吉林大学学报(工学版), 2011, 41(4): 1059-1064.
[13] LI Rui-Xue, FANG Zhi-Yi, YI Ting-Ting. Improved DVHop localization algorithm based on regularly moving anchor(RMAN) and received signal strength indicator(RSSI) and its performance analysis [J]. 吉林大学学报(工学版), 2011, 41(02): 435-0441.
[14] QU Liang-Dong, LIU Yan-Hang, WEI Da. System of vertical handoff for heterogeneous wireless network based on VPN on invehicle gateway [J]. 吉林大学学报(工学版), 2010, 40(05): 1292-1297.
[15] SUN Zhi-Xin, ZHANG Yu-Feng. P2P network traffic identification model based on MSVM [J]. 吉林大学学报(工学版), 2010, 40(05): 1298-1302.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!