On the Two sh Key Schedule
نویسندگان
چکیده
Two sh is a new block cipher with a 128 bit block, and a key length of 128, 192, or 256 bits, which has been submitted as an AES candidate. In this paper, we brie y review the structure of Two sh, and then discuss the key schedule of Two sh, and its resistance to attack. We close with some open questions on the security of Two sh's key schedule.
منابع مشابه
An observation on the Key Schedule of Twofish
The byte block cipher Two sh was proposed as a candidate for the Advanced En cryption Standard AES This paper notes the following two properties of the Two sh key schedule Firstly there is a non uniform distribution of byte whitening subkeys Sec ondly in a reduced xed Feistel round function Two sh with an byte key there is a non uniform distribution of any byte round subkey An example of two di...
متن کاملAn Observation on the Key Schedule of Two sh
The byte block cipher Two sh was proposed as a candidate for the Advanced En cryption Standard AES This paper notes the following two properties of the Two sh key schedule Firstly there is a non uniform distribution of byte whitening subkeys Sec ondly in a reduced xed Feistel round function Two sh with an byte key there is a non uniform distribution of any byte round subkey An example of two di...
متن کاملOptimal Estimation of Weibull Distribution Parameters in order to Provide Preventive-Corrective Maintenance Program for Power Transformers
In this paper, a new method for modelling and estimation of reliability parameters of power transformer components in distribution and transmission voltage levels for preventive-corrective maintenance schedule of transformers is proposed. In this method, with optimal estimation of Weibull distribution parameters using least squares method and input data uncertainty reduction, failure rate and p...
متن کاملHuman resources scheduling based on machines maintenance planning and human reliability level
In today's competitive market, quality has an important role in manufacturing system. The manufacturers attempt to maintain their production system in a proper condition to produce high quality products. One of the key factors to achieve this goal is maintenance policy. Most studies on maintenance focused on machines and less attention has been paid to human resources as the most important fact...
متن کاملA Future-Adaptable Password Scheme
Many authentication schemes depend on secret passwords Unfortunately the length and ran domness of user chosen passwords remain xed over time In contrast hardware improvements constantly give attackers increasing computational power As a result password schemes such as the traditional UNIX user authentication system are failing with time This paper discusses ways of building systems in which pa...
متن کامل