Key Schedule Algorithm using 3-Dimensional Hybrid Cubes for Block Cipher
نویسندگان
چکیده
منابع مشابه
A simple power analysis attack against the key schedule of the Camellia block cipher
This paper presents a simple power analysis attack against the key schedule of Camellia. The attack works for the smart card environment which leaks the Hamming weight of data being processed, making use of the Hamming weight to deduce all key bits. It is shown that determining the cipher key given accurate power analysis data is very fast and does not require any pair of plaintext and ciphertext.
متن کاملThe MAGENTA Block Cipher Algorithm
4 Algebraic Properties 5 4.1 The Function f(x) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 4.2 The Function PE(x; y) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 4.3 Two Successive Combinations of . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 4.4 The Function T . . . . . . . . . . . . . . . . . ...
متن کاملWhat is the Effective Key Length for a Block Cipher: an Attack on Every Block Cipher
Recently, several important block ciphers are considered to be broken by the bruteforce-like cryptanalysis, with a time complexity faster than exhaustive key search by going over the entire key space but performing less than a full encryption for each possible key. Motivated by this observation, we describe a meet-in-the-middle attack that can always be successfully mounted against any practica...
متن کاملE-Commerce Security using New Public Key Algorithm based on Block Cipher
Now a day’s, E-Commerce business is very much needed for the individuals and concern. On-line business increases information sharing, a concern regarding the exchange of money securely and conveniently over the internet increases. Therefore, security is a necessity in an ecommerce transaction. The requirements for securing ecommerce transaction are privacy, authentication, integrity maintenance...
متن کاملAn Algorithm for Key-Dependent S-Box Generation in Block Cipher System
A nonlinear substitution operation of bytes is the main strength factor of the Advanced Encryption Standard (AES) and other modern cipher systems. In this paper we have presented a new simple algorithm to generate key-dependent S-boxes and inverse S-boxes for block cipher systems. The quality of this algorithm was tested by using NIST tests, and changing only one bit of the secret key to genera...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advanced Computer Science and Applications
سال: 2019
ISSN: 2156-5570,2158-107X
DOI: 10.14569/ijacsa.2019.0100857