منابع مشابه
5 a Novel 256 - Bit Block Cipher
Tornado is a novel 256-bit block cipher that accepts a variablelength key up to 256 bits. The proposed cipher was built on an idea which gives it a dynamic nature. This nature means that the cipher execution flow varies according to the user’s input key. The confusion and diffusion processes are performed based on 10 round functions named “Storm-functions”. A selection and reordering operations...
متن کاملProposing A Symmetric Key Bit-Level Block Cipher
A novel bit level block cipher based symmetric key cryptographic technique using G.C.D is proposed in this research paper. Entire plain text file is read one character at a time and according to the binary representation of ASCII value of the characters, entire plain text file is divided into n number of 16 bit blocks. Then an agreed-upon symmetric key file is formed by dividing each 16 bit blo...
متن کاملDeal -a 128-bit Block Cipher
We propose a new block cipher, DEAL, based on the DES (DEA). DEAL has a block size of 128 bits and allows for three key sizes of 128, 192, and 256 bits respectively. Our proposal has several advantages to other schemes: because of the large blocks, the problem of the \matching ciphertext attacks" is made small, and the encryption rate is similar to that of triple-DES. We conjecture that the mos...
متن کاملTwofish: A 128-Bit Block Cipher
Twofish is a 128-bit block cipher that accepts a variable-length key up to 256 bits. The cipher is a 16-round Feistel network with a bijective F function made up of four key-dependent 8-by-8-bit S-boxes, a fixed 4-by-4 maximum distance separable matrix over GF(2), a pseudo-Hadamard transform, bitwise rotations, and a carefully designed key schedule. A fully optimized implementation of Twofish e...
متن کاملProposed Model of Block Based Symmetric Cipher
This paper is presenting cryptography model of block based cipher technique. This model is divided into two sub model one is encryption model and other is decryption model. Using encryption model, encrypt any type of data like text, image, pdf, audio. Using decryption model, decrypt same data. Due to the simplicity of the proposed model, it is very efficient. This model is also much secured due...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Korea Industrial Information Systems Research
سال: 2012
ISSN: 1229-3741
DOI: 10.9723/jksiis.2012.17.3.009