How to Strengthen DES Using Existing Hardware

نویسندگان

  • Eli Biham
  • Alex Biryukov
چکیده

requires more than trillion years on Wiener's machine 20]. Its main advantage is that organizations can increase the security of their systems which use DES in hardware, with the same encryption/decryption speed. An additional advantage is the backward compatibility to the standard DES, that can be achieved by choosing K a = K b = 0 and K c which does not modify the order of the S-boxes. Table 6 compares the security of the variants of our scheme and the standard DES.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hardwar Trojan classification and implementation and offer a new detection approach

A hardware attack that enables the attacker to alter the main circuit with malicious hardware during either design or the fabrication process is studied and analyzed. This attack, known as the hardware Trojan, has different objectives such as destroying hardware, changing circuit characteristics or extracting sensitive information. So hardware Trojan detection and hardware security are critical...

متن کامل

Performance-Based Financing to Strengthen the Health System in Benin: Challenging the Mainstream Approach

Background Performance-based financing (PBF) is often proposed as a way to improve health system performance. In Benin, PBF was launched in 2012 through a World Bank-supported project. The Belgian Development Agency (BTC) followed suit through a health system strengthening (HSS) project. This paper analyses and draws lessons from the experience of BTC-supported PBF alternative approach – especi...

متن کامل

Development of hardware system using temperature and vibration maintenance models integration concepts for conventional machines monitoring: a case study

This article describes the integration of temperature and vibration models for maintenance monitoring of conventional machinery parts in which their optimal and best functionalities are affected by abnormal changes in temperature and vibration values thereby resulting in machine failures, machines breakdown, poor quality of products, inability to meeting customers’ demand, poor inventory contro...

متن کامل

S-Box Modifications and Their Effect in DES-like Encryption Systems

This paper presents the substitution boxes (s-boxes) found in many block ciphers, and more specifically in DES-like encryption systems. It begins with a brief history of the Data Encryption Standard (DES) and the first public question on the chosen s-boxes. An outline of the DES algorithm is presented, along with a more detailed look of the cipher function that uses the s-boxes. The major m tho...

متن کامل

Lossless Microarray Image Compression by Hardware Array Compactor

Microarray technology is a new and powerful tool for concurrent monitoring of large number of genes expressions. Each microarray experiment produces hundreds of images. Each digital image requires a large storage space. Hence, real-time processing of these images and transmission of them necessitates efficient and custom-made lossless compression schemes. In this paper, we offer a new archi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1994