Block and Stream Cipher Based Cryptographic Algorithms: A Survey
نویسندگان
چکیده
The encryption algorithms are designed to provide integrity and confidentiality of the messages. Modern cryptosystems are classified into three categories such as Block ciphers, Stream cipher and Hybrid ciphers of Hummingbird. This paper details about various types of block ciphers and stream ciphers. In this paper we also present the hybrid model of hummingbird and its comparison among other cryptographic algorithms.
منابع مشابه
Cryptography for Resource Constrained Devices: A Survey
Specifically designed and developed cryptographic algorithms, which are suitable for implementation in resource constrained devices such as RFID systems, smart cards and wireless sensor networks are called light weight cryptographic algorithms. In this paper a survey is done on the selected light weight cryptographic algorithms. The light weight cryptographic algorithms are of two types, block ...
متن کاملDesign, Analysis, and FPGA prototyping of High-Performance Arithmetic for Cryptographic Applications Literature Review - Part 1: Cryptographic Algorithms
This report presents a brief survey on secret key and public key cryptography algorithms. These include: block ciphers, stream ciphers, RSA, ElGamal and Elliptic Curve Cryptosystems (ECC). Since ECC achieved security levels comparable to those of traditional public key cryptosystems using smaller keys (160 bits), this work focus more on ECC. Finally, this work also presents a survey on scalar m...
متن کاملAn Introduction to Cryptology
This paper provides an overview of the state of the art in the design of cryptographic algorithms. It reviews the different type of algorithms for encryption and authentication and explains the principles of stream ciphers, block ciphers, hash functions, public-key encryption algorithms, and digital signature schemes. Subsequently the design and evaluation procedures for cryptographic algorithm...
متن کاملLifting Based S-Box for Scalable Block Cipher Design Based on Filter Banks
The security of data exchange is considered a significant problem. It requires the use of various cryptographic algorithms, such as stream cipher and block cipher. The implementation of a secure cryptographic block cipher algorithm requires the generation of strong substitution and permutation layers. These layers should satisfy the principles of security (diffusion and confusion). The proposed...
متن کاملRecent Developments in the Design of Conventional Cryptographic Algorithms
This paper examines proposals for three cryptographic primitives: block ciphers, stream ciphers, and hash functions. It provides an overview of the design principles of a large number of recent proposals, which includes the global structure, the number of rounds, the way of introducing non-linearity and diffusion, and the key schedule. The software performance of about twenty primitives is comp...
متن کامل