TRESC: Towards redesigning existing symmetric ciphers

نویسندگان

چکیده

Recently, the security of existing symmetric cryptographic algorithms and protocols has been threatened by new performance challenges vulnerabilities. In this paper, we propose a dynamic key-dependent approach, ”TRESC”, to make ciphers more efficient robust. This can be done using substitution permutation primitives reduce number rounds while providing better resistance against cryptanalysis implementation attacks. Key Setup Algorithm (KSA) Rivest Cipher 4 (RC4) its modified variants are applied for construction these primitives. The selection RC4-KSA is due lightweight since it requires simple operation with minimal overhead. proposed solution integrated in any cipher such as Advanced Encryption Standard (AES), SIMON SPECK. analysis show robustness effectiveness solution, which strikes good balance between required level system performance.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Conversion Functions for Symmetric Key Ciphers

As a general design criterion, a symmetric key cipher should not be closed under functional composition due to the implications on the security of the cipher. However, there are scenarios in which this property is desirable and can be obtained without reducing the security of a cipher by increasing the computational workload of the cipher. We expand the idea of a symmetric key cipher being clos...

متن کامل

Learning by Test-infecting Symmetric Ciphers

We describe a novel way in which students can learn the cipher systems without much supervision. In this work we focus on learning symmetric ciphers by altering them using the agile development approach. Two agile approaches the eX treme Programming (XP) and the closely related Test-Driven Development (TDD) are mentioned or discussed. To facilitate this development we experiment with an approac...

متن کامل

Secure symmetric ciphers over the real field

Most cryptosystems are defined over finite algebraic structures where arithmetic operations are performed modulo natural numbers. This applies to private key as well as to public key ciphers. No secure cryptosystems defined over the field of real numbers are known. In this work, we demonstrate the feasibility of constructing secure symmetric key ciphers defined over the field of real numbers. W...

متن کامل

Limitations of Existing MPEG-1 Ciphers for Streaming Video

Copyright protection is one of the many aspects of implementing a commercially successful video streaming service and encryption of content is one means through which Copyright can be protected. MPEG-1 is one of the many video compression techniques used in streaming video and a number of MPEG-1 ciphers have been proposed in the past. These ciphers were primarily designed with the idea of publi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Microprocessors and Microsystems

سال: 2021

ISSN: ['0141-9331', '1872-9436']

DOI: https://doi.org/10.1016/j.micpro.2020.103478