How to Strengthen DES Using Existing Hardware
نویسندگان
چکیده
requires more than trillion years on Wiener's machine 20]. Its main advantage is that organizations can increase the security of their systems which use DES in hardware, with the same encryption/decryption speed. An additional advantage is the backward compatibility to the standard DES, that can be achieved by choosing K a = K b = 0 and K c which does not modify the order of the S-boxes. Table 6 compares the security of the variants of our scheme and the standard DES.
منابع مشابه
Hardwar Trojan classification and implementation and offer a new detection approach
A hardware attack that enables the attacker to alter the main circuit with malicious hardware during either design or the fabrication process is studied and analyzed. This attack, known as the hardware Trojan, has different objectives such as destroying hardware, changing circuit characteristics or extracting sensitive information. So hardware Trojan detection and hardware security are critical...
متن کاملPerformance-Based Financing to Strengthen the Health System in Benin: Challenging the Mainstream Approach
Background Performance-based financing (PBF) is often proposed as a way to improve health system performance. In Benin, PBF was launched in 2012 through a World Bank-supported project. The Belgian Development Agency (BTC) followed suit through a health system strengthening (HSS) project. This paper analyses and draws lessons from the experience of BTC-supported PBF alternative approach – especi...
متن کاملDevelopment of hardware system using temperature and vibration maintenance models integration concepts for conventional machines monitoring: a case study
This article describes the integration of temperature and vibration models for maintenance monitoring of conventional machinery parts in which their optimal and best functionalities are affected by abnormal changes in temperature and vibration values thereby resulting in machine failures, machines breakdown, poor quality of products, inability to meeting customers’ demand, poor inventory contro...
متن کاملS-Box Modifications and Their Effect in DES-like Encryption Systems
This paper presents the substitution boxes (s-boxes) found in many block ciphers, and more specifically in DES-like encryption systems. It begins with a brief history of the Data Encryption Standard (DES) and the first public question on the chosen s-boxes. An outline of the DES algorithm is presented, along with a more detailed look of the cipher function that uses the s-boxes. The major m tho...
متن کاملLossless Microarray Image Compression by Hardware Array Compactor
Microarray technology is a new and powerful tool for concurrent monitoring of large number of genes expressions. Each microarray experiment produces hundreds of images. Each digital image requires a large storage space. Hence, real-time processing of these images and transmission of them necessitates efficient and custom-made lossless compression schemes. In this paper, we offer a new archi...
متن کامل