A customized 152 bit key DES algorithm
نویسندگان
چکیده
منابع مشابه
Dynamic Key Generattion to Enhance DES Algorithm Securities Using FPGA
This paper proposed a “Dynamic key generation” for DES algorithm which makes DES strong. DES is acronym for “Data Encryption Standard”. Based on the analysis of DES algorithm, the generation of sub key and its arithmetic is weak, so that key generation can be reconfigured. For key generation, we can use three modes, first one is “Direct key” by the user, second one is key shifted through “LFSR”...
متن کاملFPGA Implementation DIFFIE-HELLMAN key Exchange Algorithm using DES
Zero-knowledge proof (ZKP) plays an important role in authentication without revealing secret information. Diffie–Hellman (D-H) key exchange algorithm was developed to exchange secret keys through unprotected channels. Previously we have diffiehellmen key exchange algorithm. It has some security attacks like man in the middle attack to overcome this attack by using zero knowledge proof concepts...
متن کاملBinar Shuffle Algorithm: Shuffling Bit by Bit
Frequently, randomly organized data is needed to avoid an anomalous operation of other algorithms and computational processes. An analogy is that a deck of cards is ordered within the pack, but before a game of poker or solitaire the deck is shuffled to create a random permutation. Shuffling is used to assure that an aggregate of data elements for a sequence S is randomly arranged, but avoids a...
متن کاملKey scheduling DES type cryptosystems
This paper reviews some possible design criteria for the key schedule in a DES style cryptosystem. The key schedule involves a Key Rotation component. and the permutation PC2. Together these provide for a diffusion of dependency of ciphertext bits on key bits. Some empirical rules which seem to account for the derivation of the key schedule used in the DES are first presented. A number of trial...
متن کاملRelated - Key Cryptanalysis of 3 - WAY , Biham - DES , CAST , DES
We present new related-key attacks on the block ciphers 3-ential related-key attacks allow both keys and plaintexts to be chosen with speciic diierences KSW96]. Our attacks build on the original work, showing how to adapt the general attack to deal with the diiculties of the individual algorithms. We also give speciic design principles to protect against these attacks.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The International Conference on Electrical Engineering
سال: 2010
ISSN: 2636-4441
DOI: 10.21608/iceeng.2010.32840