PERBANDINGAN KONSUMSI ENERGI ALGORITMA AES (256 BIT) DAN TWOFISH (256 BIT) PADA PONSEL BERBASIS ANDROID
نویسندگان
چکیده
منابع مشابه
A New Dedicated 256-Bit Hash Function: FORK-256
This paper describes a new software-efficient 256-bit hash function, FORK-256. Recently proposed attacks on MD5 and SHA-1 motivate a new hash function design. It is designed not only to have higher security but also to be faster than SHA-256. The performance of the new hash function is at least 30% better than that of SHA-256 in software. And it is secure against any known cryptographic attacks...
متن کاملNESHA-256, NEw 256-bit Secure Hash Algorithm (Extended Abstract)
In this paper, we introduce a new dedicated 256-bit hash function: NESHA-256. The recently contest for hash functions held by NIST, motivates us to design the new hash function which has a parallel structure. Advantages of parallel structures and also using some ideas from the designing procedure of block-cipher-based hash functions strengthen our proposed hash function both in security and in ...
متن کامل5 a Novel 256 - Bit Block Cipher
Tornado is a novel 256-bit block cipher that accepts a variablelength key up to 256 bits. The proposed cipher was built on an idea which gives it a dynamic nature. This nature means that the cipher execution flow varies according to the user’s input key. The confusion and diffusion processes are performed based on 10 round functions named “Storm-functions”. A selection and reordering operations...
متن کاملBLAKE and 256-bit advanced vector extensions
Intel recently documented its AVX2 instruction set extension that introduces support for 256-bit wide single-instruction multiple-data (SIMD) integer arithmetic over double (32-bit) and quad (64-bit) words. This will enable Intel’s future processors—starting with the Haswell architecture, to be released in 2013—to fully support 4-way SIMD com putation of 64-bit ARX algorithms (32-bit is alread...
متن کاملComparison of 256-bit stream ciphers
This paper evaluates and compares several stream ciphers that use 256-bit keys: counter-mode AES, CryptMT, DICING, Dragon, Fubuki, HC-256, Phelix, Py, Py6, Salsa20, SOSEMANUK, VEST, and YAMB.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electro Luceat
سال: 2015
ISSN: 2597-4467,2527-4724
DOI: 10.32531/jelekn.v1i1.13