A Novel Feistel Cipher Involving a Bunch of Keys
نویسندگان
چکیده
In this investigation, we have developed a novel block cipher by modifying classical Feistel cipher. In this, we have used a key bunched wherein each key has a multiplicative inverse. The cryptanalysis carried out in this investigation clearly shows that this cipher cannot be broken by any attack. Keywords-encryption; decryption; cryptanalysis; avalanche effect; multiplicative inverse.
منابع مشابه
A Novel Feistel Cipher Involving
In the present investigation, we developed a novel Feistel cipher by dividing the plaintext into a pair of matrices. In the process of encryption, we have used a bunch of keys and modular arithmetic addition. The avalanche effect shows that the cipher is a strong one. The cryptanalysis carried out on this cipher indicates that this cipher cannot be broken by any cryptanalytic attack and it can ...
متن کاملA Block Cipher Obtained By Blending Modified Feistel Cipher And Advanced Hill Cipher Involving A Pair Of Key Matrices
In this investigation, we have developed a block cipher by blending a modified Feistel cipher and the advanced Hill cipher. In this analysis, we have made use of a pair of involutory matrices, say A and B which include the keys K and L. Here the size of the plaintext is 1024 binary bits and the size of the keys (both put together) is 256 binary bits. The involutory matrices A and B, the modular...
متن کاملOn Feistel ciphers with alternating round functions and whitening keys
In [1] it was shown that a n-bit balanced Feistel cipher with identical round functions and independent preand post-whitening keys can be broken using n2n=2+1 chosen plaintexts in O(n2n=2) time and space. This paper presents an extension of that result showing that the “sliding with a twist” technique of [2] can be used to break a more general class of Feistel cipher with essentially the same r...
متن کاملDiierential Cryptanalysis of Feistel Ciphers and Diierentially -uniform Mappings
In this paper we study the round permutations (or S-boxes) which provide to Feistel ciphers the best resistance against diierential crypt-analysis. We prove that a Feistel cipher with any round keys and with at least 5 rounds resists any diierential attack if its round permutation is diierentially-uniform for a small. This improves an earlier result due to Nyberg and Knudsen which only held for...
متن کاملMetadata Driven Efficient Key Generation and Distribution in Cloud Security
With rapid development of cloud computing to a greater extent IT industries outsource their sensitive data at cloud data storage location. To keep the stored data confidential against untrusted cloud service providers, a natural way is to store only encrypted data in the cloud severs and providing an efficient access control mechanism using a competent cipher key-Cmxn, which is becoming a promi...
متن کامل