The CAST-256 Encryption Algorithm
نویسندگان
چکیده
This document contains several sections of the CAST-256 AES Submission Package delivered to NIST on June 9, 1998. All complete submissions received by NIST will be made public in late August at the First AES Candidate Conference, but the following material is being made available now so that public analysis of the CAST-256 algorithm may begin (see, for example, http://www.ii.uib.no/~larsr/aes.html for the current status of submitted algorithms).
منابع مشابه
Improved Differential Cryptanalysis of CAST-128 and CAST-256
CAST-128 and CAST-256 are two symmetric algorithms designed by Adams in 1990s. Both of them adopt the CAST design procedure which makes them process a number of desirable cryptographic. CAST-128 is notably used as the default cipher in some versions of GNU Privacy Guard (GPG) and Pretty Good Privacy (PGP) systems. As an extension of CAST-128, CAST-256 was submitted as a candidate for the Advanc...
متن کاملAn Adaptively Secure Identity-Based Broadcast Encryption using CAST Algorithm
An adaptively secure identity-based broadcast encryption system featuring constant sized ciphertext is introduced. The size of public key and private keys of the system are both linear in the maximum number of receivers. The system is fully collusion-resistant and has stateless receivers. Here, in the system CAST algorithm is used for encryption of the broadcast message. The scheme is well opti...
متن کاملPerformance Evaluation of RC6, Blowfish, DES, IDEA, CAST-128 Block Ciphers
Rapid growth of internet applications fueled the need for securing information and computers. Encryption algorithms play vital role to secure information. This paper provides comparison of most common encryption algorithms namely: DES, Blowfish, CAST-128, RC6, IDEA. Performance evaluation is carried out on the basis of execution time and throughput. These algorithms has different key and block ...
متن کاملDesign and Implementation of Area-optimized 256-bit Advanced Encryption Standard for real time images on FPGA
A new Vertex6-chipscope based implementation scheme of the AES-256 (Advanced Encryption Standard, with 256-bit key) encryption and decryption algorithm is proposed in this paper. For maintaining the speed of encryption and decryption, the pipelining technology is applied and the mode of data transmission is modified in this design so that the chip size can be reduced. The 256-bit plaintext and ...
متن کاملA Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm
For many years, cryptanalysis has been considered as an attractive topic in jeopardizing the security and resistance of an encryption algorithm. The SDES encryption algorithm is a symmetric cryptography algorithm that performs a cryptographic operation using a crypt key. In the world of encryption, there are many search algorithms to cryptanalysis. In these researches, brute force attack algori...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- RFC
دوره 2612 شماره
صفحات -
تاریخ انتشار 1999