نتایج جستجو برای: serpent block cipher

تعداد نتایج: 165035  

2002
Ralph Wernsdorf

For the block cipher RIJNDAEL with a block length of 128 bits group theoretic properties of the round functions are derived. Especially it is shown that these round functions generate the alternating group.

2001
Takeshi Shimoyama Hitoshi Yanami Kazuhiro Yokoyama Masahiko Takenaka Kouichi Itoh Jun Yajima Naoya Torii Hidema Tanaka

In this paper, we propose a new symmetric key block cipher SC2000 with 128-bit block length and 128-,192-,256-bit key lengths. The block cipher is constructed by piling two layers: one is a Feistel structure layer and the other is an SPN structure layer. Each operation used in two layers is S-box or logical operation, which has been well studied about security. It is a strong feature of the cip...

2013
P. MAHESH KUMAR

Advanced Encryption Standard (AES), also known as Rijndael, is an encryption standard used for securing information. AES was published by NIST (National Institute of Standards and Technology). AES is a block cipher algorithm that has been analyzed extensively and is now used widely. AES is a symmetric block cipher that is intended to replace DES as the approved standard for a wide range of appl...

1997
Joan Daemen Lars R. Knudsen Vincent Rijmen

In this paper we present a new 128-bit block cipher called Square. The original design of Square concentrates on the resistance against differential and linear cryptanalysis. However, after the initial design a dedicated attack was mounted that forced us to augment the number of rounds. The goal of this paper is the publication of the resulting cipher for public scrutiny. A C implementation of ...

Journal: :I. J. Network Security 2005
Hussein Ahmad Al Hassan Magdy Saeb Hassan Desoky Hamed

The “PYRAMIDS” Block Cipher is a symmetric encryption algorithm of a 64, 128, 256-bit plaintext block, that accepts a variable key length of 128, 192, 256 bits. The algorithm is an iterated cipher consisting of repeated applications of simple round transformations with different operations and different sequences in each round.

2003
Daesung Kwon Jaesung Kim Sangwoo Park Soo Hak Sung Yaekwon Sohn Jung Hwan Song Yongjin Yeom E-Joong Yoon Sangjin Lee Jaewon Lee Seongtaek Chee Daewan Han Jin Hong

In this paper, we propose a 128-bit block cipher ARIA which is an involution substitution and permutation encryption network(SPN). We use the same S-boxes as Rijndael to eliminate defects which are caused by a totally involution structure. In the diffusion layer of ARIA, a 16×16 binary matrix of the maximum branch number 8 is used to avoid some attacks well applied to the reduced round of Rijnd...

2016

In this paper we give a short overview of Symmetric key block cipher for different algorithms presented in this field according to classified it in cryptography where we classified into categories. first, Mode of operation which is ways helped to apply block cipher to encrypt larger plaintext. second, iterated product cipher which also classified it into Feistel Network, substitution-permutatio...

Journal: :IACR transaction on symmetric cryptology 2022

In the past 20 years since their conception, boomerang attacks have become an important tool in cryptanalysis of block ciphers. classical estimate success probability, assumptions are made about independence underlying differential trails that not well-founded. We underline problems inherent these by using them to prove for any there exists a trail over entire cipher with higher probability tha...

2011
Jian Guo Thomas Peyrin Axel Poschmann Matthew J. B. Robshaw

We present a new block cipher LED. While dedicated to compact hardware implementation, and offering the smallest silicon footprint among comparable block ciphers, the cipher has been designed to simultaneously tackle three additional goals. First, we explore the role of an ultra-light (in fact non-existent) key schedule. Second, we consider the resistance of ciphers, and LED in particular, to r...

2003
Olivier Billet Henri Gilbert

In this paper we propose a new symmetric block cipher with the following paradoxical traceability properties: it is computationally easy to derive many equivalent secret keys providing distinct descriptions of the same instance of the block cipher. But it is computationally difficult, given one or even up to k equivalent keys, to recover the so called meta-key from which they were derived, or t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید