نتایج جستجو برای: aes 128

تعداد نتایج: 29461  

Journal: :Lecture Notes in Computer Science 2022

Finding optimal related-key differential characteristics for a given cipher is problem that hardly scales. For the first time, we study this against 25 instances of block Rijndael, which are little brothers AES. To achieve this, adapt and improve an existing approach AES based on Constraint Programming. The attacks presented here overpass all previous cryptanalytic results Rijndael. Among our r...

Journal: :IACR Cryptology ePrint Archive 2017
Ming-Shing Chen Wen-Ding Li Bo-Yuan Peng Bo-Yin Yang Chen-Mou Cheng

Multivariate Public Key Cryptosystems (MPKCs) are often touted as future-proofing against Quantum Computers. In 2009, it was shown that hardware advances do not favor just “traditional” alternatives such as ECC and RSA, but also makes MPKCs faster and keeps them competitive at 80-bit security when properly implemented. These techniques became outdated due to emergence of new instruction sets an...

2014
Parneet Kaur Jagmohan Singh Kamaljit Singh

The security of any cryptography algorithm depends upon its key length and block size, by increasing the key length we actually enhance the security of the data being encrypted by a particular algorithm. Depending upon the requirements and confidentiality of the data we use the various cryptography algorithms available till now that may include DES .AES which is a successor of DES having 128-bi...

2014
Nail Etkin Can Akkaya Raymond Carley

This report presents low power hardware implementations of the advanced encryption standard (AES). The low power circuit level design were implemented in a 65nm CMOS process from STMicroelectronics. A full AES model in System Verilog was written. This design was synthesized in Synopsys Design Compiler using a range of standard cell gate libraries for comparison purposes and to find the lowest p...

Journal: :I. J. Network Security 2007
Chetan Nanjunda Mathur K. P. Subbalakshmi

The Wired Equivalent Privacy (WEP) uses the 64 bit RC4 secret key stream cipher as its layer 2 security protocol. Although the underlying RC4 cipher is secure, the potential reuse of the same key stream by different frames is a weakness in the WEP. One enhancement to WEP is the Temporal Key Integrity Protocol (TKIP), which acts as a wrapper to the WEP protocol and uses a 128 bit RC4 encryption ...

2008
Chih-Peng Fan Jun-Kui Hwang

In this paper, we use FPGA chips to realize the high throughput 128 bits AES cipher processor with new high-speed and hardware sharing functional blocks. The AES functional calculations include four transformation stages, which are the SubBytes, the ShiftRows, the MixColumns and the AddRoundKey. First, the content-addressable memory(CAM) based scheme is used to realize the proposed pipelined hi...

1999
Doug Whiting John Kelsey Bruce Schneier David Wagner Niels Ferguson Chris Hall

Twofish is a 128-bit block cipher submitted as an AES candidate [SKW+98]. Mirza and Murphy [MM99] recently noted two interesting properties in the Twofish key schedule for 128-bit keys: there is a non-uniform distribution of 128-bit whitening keys, and the 64-bit round subkeys are non-uniformly distributed over each subset of keys that fixes the S-boxes. This paper extends these results and exp...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید