On the Two sh Key Schedule

نویسندگان

  • Bruce Schneier
  • John Kelsey
  • Doug Whiting
  • David Wagner
  • Chris Hall
  • Niels Ferguson
چکیده

Two sh is a new block cipher with a 128 bit block, and a key length of 128, 192, or 256 bits, which has been submitted as an AES candidate. In this paper, we brie y review the structure of Two sh, and then discuss the key schedule of Two sh, and its resistance to attack. We close with some open questions on the security of Two sh's key schedule.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An observation on the Key Schedule of Twofish

The byte block cipher Two sh was proposed as a candidate for the Advanced En cryption Standard AES This paper notes the following two properties of the Two sh key schedule Firstly there is a non uniform distribution of byte whitening subkeys Sec ondly in a reduced xed Feistel round function Two sh with an byte key there is a non uniform distribution of any byte round subkey An example of two di...

متن کامل

An Observation on the Key Schedule of Two sh

The byte block cipher Two sh was proposed as a candidate for the Advanced En cryption Standard AES This paper notes the following two properties of the Two sh key schedule Firstly there is a non uniform distribution of byte whitening subkeys Sec ondly in a reduced xed Feistel round function Two sh with an byte key there is a non uniform distribution of any byte round subkey An example of two di...

متن کامل

Optimal Estimation of Weibull Distribution Parameters in order to Provide Preventive-Corrective Maintenance Program for Power Transformers

In this paper, a new method for modelling and estimation of reliability parameters of power transformer components in distribution and transmission voltage levels for preventive-corrective maintenance schedule of transformers is proposed. In this method, with optimal estimation of Weibull distribution parameters using least squares method and input data uncertainty reduction, failure rate and p...

متن کامل

Human resources scheduling based on machines maintenance planning and human reliability level

In today's competitive market, quality has an important role in manufacturing system. The manufacturers attempt to maintain their production system in a proper condition to produce high quality products. One of the key factors to achieve this goal is maintenance policy. Most studies on maintenance focused on machines and less attention has been paid to human resources as the most important fact...

متن کامل

A Future-Adaptable Password Scheme

Many authentication schemes depend on secret passwords Unfortunately the length and ran domness of user chosen passwords remain xed over time In contrast hardware improvements constantly give attackers increasing computational power As a result password schemes such as the traditional UNIX user authentication system are failing with time This paper discusses ways of building systems in which pa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998