scispace - formally typeset
Search or ask a question

Showing papers on "Format-preserving encryption published in 2021"


Journal ArticleDOI
04 Jun 2021
TL;DR: An efficient implementation of Format-preserving Encryption Algorithm (FEA), which is the Korean standard of FPE, and the first-order masked implementation of FEA on both low-end and high-end IoT devices.
Abstract: Format-Preserving Encryption (FPE) for Internet of Things (IoT) enables the data encryption while preserving the format and length of original data. With these advantages, FPE can be utilized in many IoT applications. However, FPE requires complicated computations and these are high overheads on IoT embedded devices. In this paper, we proposed an efficient implementation of Format-preserving Encryption Algorithm (FEA), which is the Korean standard of FPE, and the first-order masked implementation of FEA on both low-end (i.e., AVR microcontroller) and high-end (i.e., ARM processor) IoT devices. Firstly, we show the vulnerability of FEA when it comes to the Correlation Power Analysis (CPA) approach. Afterward, we propose an efficient implementation method and the masking technique for both low-end IoT device and high-end IoT device. The proposed method is secure against power analysis attacks but the performance degradation of masked measure is only 2.53∼3.77% than the naive FEA implementation.

6 citations


Book ChapterDOI
17 Oct 2021
TL;DR: The best currently known attack on the Feistel construction FF3 has data and memory complexity of \({O}(N^{11/6})) where the input belongs to a domain of size N \times N\.
Abstract: Format-Preserving Encryption (FPE) schemes accept plaintexts from any finite set of values (such as social security numbers or birth dates) and produce ciphertexts that belong to the same set. They are extremely useful in practice since they make it possible to encrypt existing databases or communication packets without changing their format. Due to industry demand, NIST had standardized in 2016 two such encryption schemes called FF1 and FF3. They immediately attracted considerable cryptanalytic attention with decreasing attack complexities. The best currently known attack on the Feistel construction FF3 has data and memory complexity of \({O}(N^{11/6})\) and time complexity of \({O}(N^{17/6})\), where the input belongs to a domain of size \(N \times N\).

3 citations


Posted Content
TL;DR: The best currently known attack on the Feistel construction FF3 has data and memory complexity of \({O}(N^{11/6})) where the input belongs to a domain of size N \times N\ as discussed by the authors.
Abstract: Format-Preserving Encryption (FPE) schemes accept plaintexts from any finite set of values (such as social security numbers or birth dates) and produce ciphertexts that belong to the same set. They are extremely useful in practice since they make it possible to encrypt existing databases or communication packets without changing their format. Due to industry demand, NIST had standardized in 2016 two such encryption schemes called FF1 and FF3. They immediately attracted considerable cryptanalytic attention with decreasing attack complexities. The best currently known attack on the Feistel construction FF3 has data and memory complexity of \({O}(N^{11/6})\) and time complexity of \({O}(N^{17/6})\), where the input belongs to a domain of size \(N \times N\).

1 citations



Proceedings ArticleDOI
08 Jul 2021
TL;DR: The implementation and current presentation of statistical analysis methods for encoding a message /converting code into plain text is proposed in this article, where the FPE was designed based on a block cipher and used as the basis for data encryption.
Abstract: The implementation and current presentation of statistical analysis methods for encoding a message /converting code into plain text is proposed in this paper. Data using Format-Preserving Encryption(FPE) is discussed in this article. FPE converts plaintext of a specific format into a ciphertext of the same format— e.g., converting valid credit card number (CCN) into valid CCN. To defend confidentiality or own data, cryptography is commonly used in routine apps like internet transfers, VPN systems, file encryption, or complete hard drives. When introducing an FPE scheme, the data structure is maintained, database structures are improved to secure, and the database integrity is ensured. It is suitable for masking data. Data masking hides or replaces a unique data form with random data Ensuring Data Security in Databases Using Format Preserving Encryption. In this project, the FPE was designed based on a block cipher and used as the basis for data encryption the RC5 bit encryption because RC5 has the variable word size, round numbers, and secret variable key. Also, active or protected format protection encryption/decryption systems and quantitative input data must be implemented to improve data security or ensure accurate and confidential messages. This approach's implementation helps all forms of data formats, but this work analyzes numerical information methodology, like CCN. This is tested by RC5 on multiple CCN, symmetric key encryption algorithm. The execution time of FPE is 4934470 nanoseconds. The execution time of the proposed format preserved RC5 algorithm is very less in comparison to the existing AES+FPE approach.

Patent
26 Jan 2021
TL;DR: The present disclosure relates to vaultless format-preserving tokenization systems and methods as discussed by the authors, which are based on a token format schema and use a secure tweak for the encoded input data.
Abstract: Embodiments of the present disclosure relate to vaultless format-preserving tokenization systems and methods. Some methods include encoding a first data set to produce encoded input data; generating a secure tweak for the encoded input data based on a token format schema by: encoding a tweak input to produce an encoded tweak input; and hashing the encoded tweak input along with a unique hashing key to generate the secure tweak; applying a format preserving encryption algorithm that utilizes the encoded input data, the secure tweak, and a unique encryption key to generate ciphertext output; and generating a token from the ciphertext output.