7.4.1.2 Block Ciphers

نویسنده

  • Michael McKinley
چکیده

Ciphers can be classified into two groups, based on the nature of the key. The family we’ll be talking about is symmetric-key the same key is used to encrypt and decrypt the data. There is a second family, called asymmetric-key cryptography. In assymetric key cryptography, the sender uses one key to encrypt and second to decrypt. Discussion and analysis of assymetric-key cryptography is beyond the scope of this project.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Chaos and Cryptography: Block Encryption Ciphers Based on Chaotic Maps

This paper is devoted to the analysis of the impact of chaos-based techniques on block encryption ciphers. We present several chaos based ciphers. Using the well-known principles in the cryptanalysis we show that these ciphers do not behave worse than the standard ones, opening in this way a novel approach to the design of block encryption ciphers.

متن کامل

A Filter Bank View of Block and Stream Ciphers

Vaidyanathan suggested the use of filter banks with coefficients in finite fields as stream ciphers. We show how to break those ciphers. A more general class of ciphers is introduced, which includes many well-known block ciphers, like DES, IDEA, etc. These ciphers are derived from filter banks over group rings.

متن کامل

Block Ciphers And Cryptanalysis

This report gives a basic introduction to block cipher design and analysis. The concepts and design principles of block ciphers are explained, particularly the class of block ciphers known as Feistel ciphers. Some modern block cipher cryptanalysis methods are demonstrated by applying them to variants of a weak Feistel cipher called Simplified TEA (STEA), which is based on the Tiny Encryption Al...

متن کامل

A Survey of Cryptanalytic Attacks on Lightweight Block Ciphers

Lightweight block ciphers are used in applications where low power consumption is a requirement along with hardware area constraints regarding their implementation. Design of these ciphers demands an optimal tradeoff between computational efficiency and security. These ciphers being supportive in fast and secure transmission of data from one location to another are prone to several attacks that...

متن کامل

MitM Fault Analysis on Word-oriented SPN Block Ciphers.dvi

Meet-in-the-Middle (MitM) fault analysis is a kind of powerful cryptanalytic approach suitable for various block ciphers. When applying the method to analyze the security of block ciphers, it is very crucial to find effective MitM characteristics based on some fault models. In this paper, we investigate the security of word-oriented SPN block ciphers by means of MitM fault analysis, and observe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009