Survey: Block cipher Methods

ثبت نشده
چکیده

In this paper we give a short overview of Symmetric key block cipher for different algorithms presented in this field according to classified it in cryptography where we classified into categories. first, Mode of operation which is ways helped to apply block cipher to encrypt larger plaintext. second, iterated product cipher which also classified it into Feistel Network, substitution-permutation networks and Unbalanced Feistel Network.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

New Fixed Point Attacks on GOST2 Block Cipher

GOST block cipher designed in the 1970s and published in 1989 as the Soviet and Russian standard GOST 28147-89. In order to enhance the security of GOST block cipher after proposing various attacks on it, designers published a modified version of GOST, namely GOST2, in 2015 which has a new key schedule and explicit choice for S-boxes. In this paper, by using three exactly identical portions of ...

متن کامل

Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version)

Impossible differential attack is a well-known mean to examine robustness of block ciphers. Using impossible differ- ential cryptanalysis, we analyze security of a family of lightweight block ciphers, named Midori, that are designed considering low energy consumption. Midori state size can be either 64 bits for Midori64 or 128 bits for Midori128; however, both vers...

متن کامل

Block and Stream Cipher Based Cryptographic Algorithms: A Survey

The encryption algorithms are designed to provide integrity and confidentiality of the messages. Modern cryptosystems are classified into three categories such as Block ciphers, Stream cipher and Hybrid ciphers of Hummingbird. This paper details about various types of block ciphers and stream ciphers. In this paper we also present the hybrid model of hummingbird and its comparison among other c...

متن کامل

Survey on Lightweight Block Cipher

183  Abstract— With the rapid advances in wireless networks low-end devices, such as RFID tags, wireless sensor nodes are deployed in increasing numbers each and every day. Such devices are used in many applications and environments, leading to an ever increasing need to provide security. When choosing security algorithms for resource-limited devices the implementation cost should be taken int...

متن کامل

Total break of Zorro using linear and differential attacks

An AES-like lightweight block cipher, namely Zorro, was proposed in CHES 2013. While it has a 16-byte state, it uses only 4 S-Boxes per round. This weak nonlinearity was widely criticized, insofar as it has been directly exploited in all the attacks on Zorro reported by now, including the weak key, reduced round, and even full round attacks. In this paper, using some properties discovered by Wa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016