Implement A Novel Symmetric Block Cipher Algorithm
نویسندگان
چکیده
منابع مشابه
a novel block cipher algorithm with feistel-like structure
block ciphers have wide applications for hardware and software implementations. in this paper, a new block cipher algorithm with provable security is proposed. the whole structure of the algorithm is novel and has a good encryption and decryption performance. additionally, it has good security with few number of rounds. the structure of the proposed algorithm consists of 4-rounds feistel-like w...
متن کاملA Novel Method to Implement Book Cipher
Armed with super computational ability, the most efficient attack on symmetric-key systems is an exhaustive key search. A novel encryption method with infinite key space is presented by modifying traditional book cipher. Infinite key space means the unbounded entropy of the key space, which can frustrate any exhaustive key search. Moreover, this book cipher is immune from frequency analysis. Ex...
متن کاملNovel Impossible Differential Cryptanalysis of Zorro Block Cipher
Impossible difference attack is a powerful tool for evaluating the security of block ciphers based on finding a differential characteristic with the probability of exactly zero. The linear layer diffusion rate of a cipher plays a fundamental role in the security of the algorithm against the impossible difference attack. In this paper, we show an efficient method, which is independent of the qua...
متن کاملProposed Model of Block Based Symmetric Cipher
This paper is presenting cryptography model of block based cipher technique. This model is divided into two sub model one is encryption model and other is decryption model. Using encryption model, encrypt any type of data like text, image, pdf, audio. Using decryption model, decrypt same data. Due to the simplicity of the proposed model, it is very efficient. This model is also much secured due...
متن کاملThe MAGENTA Block Cipher Algorithm
4 Algebraic Properties 5 4.1 The Function f(x) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 4.2 The Function PE(x; y) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 4.3 Two Successive Combinations of . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 4.4 The Function T . . . . . . . . . . . . . . . . . ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal on Cryptography and Information Security
سال: 2014
ISSN: 1839-8626
DOI: 10.5121/ijcis.2014.4401