A customized 152 bit key DES algorithm

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dynamic Key Generattion to Enhance DES Algorithm Securities Using FPGA

This paper proposed a “Dynamic key generation” for DES algorithm which makes DES strong. DES is acronym for “Data Encryption Standard”. Based on the analysis of DES algorithm, the generation of sub key and its arithmetic is weak, so that key generation can be reconfigured. For key generation, we can use three modes, first one is “Direct key” by the user, second one is key shifted through “LFSR”...

متن کامل

FPGA Implementation DIFFIE-HELLMAN key Exchange Algorithm using DES

Zero-knowledge proof (ZKP) plays an important role in authentication without revealing secret information. Diffie–Hellman (D-H) key exchange algorithm was developed to exchange secret keys through unprotected channels. Previously we have diffiehellmen key exchange algorithm. It has some security attacks like man in the middle attack to overcome this attack by using zero knowledge proof concepts...

متن کامل

Binar Shuffle Algorithm: Shuffling Bit by Bit

Frequently, randomly organized data is needed to avoid an anomalous operation of other algorithms and computational processes. An analogy is that a deck of cards is ordered within the pack, but before a game of poker or solitaire the deck is shuffled to create a random permutation. Shuffling is used to assure that an aggregate of data elements for a sequence S is randomly arranged, but avoids a...

متن کامل

Key scheduling DES type cryptosystems

This paper reviews some possible design criteria for the key schedule in a DES style cryptosystem. The key schedule involves a Key Rotation component. and the permutation PC2. Together these provide for a diffusion of dependency of ciphertext bits on key bits. Some empirical rules which seem to account for the derivation of the key schedule used in the DES are first presented. A number of trial...

متن کامل

Related - Key Cryptanalysis of 3 - WAY , Biham - DES , CAST , DES

We present new related-key attacks on the block ciphers 3-ential related-key attacks allow both keys and plaintexts to be chosen with speciic diierences KSW96]. Our attacks build on the original work, showing how to adapt the general attack to deal with the diiculties of the individual algorithms. We also give speciic design principles to protect against these attacks.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The International Conference on Electrical Engineering

سال: 2010

ISSN: 2636-4441

DOI: 10.21608/iceeng.2010.32840