Key Schedule Algorithm using 3-Dimensional Hybrid Cubes for Block Cipher

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A simple power analysis attack against the key schedule of the Camellia block cipher

This paper presents a simple power analysis attack against the key schedule of Camellia. The attack works for the smart card environment which leaks the Hamming weight of data being processed, making use of the Hamming weight to deduce all key bits. It is shown that determining the cipher key given accurate power analysis data is very fast and does not require any pair of plaintext and ciphertext.

متن کامل

The MAGENTA Block Cipher Algorithm

4 Algebraic Properties 5 4.1 The Function f(x) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 4.2 The Function PE(x; y) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 4.3 Two Successive Combinations of . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 4.4 The Function T . . . . . . . . . . . . . . . . . ...

متن کامل

What is the Effective Key Length for a Block Cipher: an Attack on Every Block Cipher

Recently, several important block ciphers are considered to be broken by the bruteforce-like cryptanalysis, with a time complexity faster than exhaustive key search by going over the entire key space but performing less than a full encryption for each possible key. Motivated by this observation, we describe a meet-in-the-middle attack that can always be successfully mounted against any practica...

متن کامل

E-Commerce Security using New Public Key Algorithm based on Block Cipher

Now a day’s, E-Commerce business is very much needed for the individuals and concern. On-line business increases information sharing, a concern regarding the exchange of money securely and conveniently over the internet increases. Therefore, security is a necessity in an ecommerce transaction. The requirements for securing ecommerce transaction are privacy, authentication, integrity maintenance...

متن کامل

An Algorithm for Key-Dependent S-Box Generation in Block Cipher System

A nonlinear substitution operation of bytes is the main strength factor of the Advanced Encryption Standard (AES) and other modern cipher systems. In this paper we have presented a new simple algorithm to generate key-dependent S-boxes and inverse S-boxes for block cipher systems. The quality of this algorithm was tested by using NIST tests, and changing only one bit of the secret key to genera...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Advanced Computer Science and Applications

سال: 2019

ISSN: 2156-5570,2158-107X

DOI: 10.14569/ijacsa.2019.0100857