Block cipher four implementation on field programmable gate array
Block ciphers are used to protect data in information systems from being leaked to unauthorized people. One of many block cipher algorithms developed by Indonesian researchers is the BCF (Block Cipher-Four) - a block cipher with 128-bit input/output that
Yusuf Kurniawan, Muhammad Adli Rizqulloh
doaj +1 more source
Counter Mode Development for Block Cipher Operations [PDF]
There are two basic types of symmetric algorithms: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertext—usually of 64 bits but sometimes longer.
Ali Sagheer
doaj +1 more source
How to distinguish between a block cipher and a random permutation by lowering the input entropy [PDF]
IEEE 35th International Carnahan Conference on Security Technology. Londres, 16-19 October 2001A novel cryptanalysis technique is presented, and its suitability for distinguishing a block cipher algorithm or a hash function from a random permutation is ...
González-Tablas, Ana Isabel+3 more
core +3 more sources
On the Design of Secure and Fast Double Block Length Hash Functions [PDF]
In this work the security of the rate-1 double block length hash functions, which based on a block cipher with a block length of n-bit and a key length of 2n-bit, is reconsidered.
Chen, Kefei, Gong, Z., Lai, X.J.
core +11 more sources
New Constructions of MACs from (Tweakable) Block Ciphers
We propose new constructions of Message Authentication Codes (MACs) from tweakable or conventional block ciphers. Our new schemes are either stateless and deterministic, nonce-based, or randomized, and provably secure either in the standard model for ...
Benoît Cogliati+2 more
doaj +1 more source
High-Speed Fault Attack Resistant Implementation of PIPO Block Cipher on ARM Cortex-A
In ICISC’20 conference, PIPO (Plug-In and Plug-Out) was proposed as an efficient block cipher for secure communication in IoT (Internet of Things) environment.
Jingyo Song+2 more
doaj +1 more source
Pengembangan Modul Enkripsi dan Dekripsi pada Php dengan Modifikasi Metode Kriptografi Vigenere Cipher dan Cipher Block Chaining (Studi Kasus pada Geekybyte.com) [PDF]
Penggunaan fungsi hash pada pengamanan data atau informasi pada sebuah web site sudah tidak aman lagi, karena memiliki kelemahan berupa collision. Pengamanan yang dilakukan tidak tergantung pada kerahasiaan metode atau algortima yang digunakan, tetapi ...
Aribowo, E. (Eko)+1 more
core +5 more sources
A General Analysis of the Security of Elastic Block Ciphers [PDF]
We analyze the security of elastic block ciphers in general to show that an attack on an elastic version of block cipher implies a polynomial time related attack on the fixed-length version of the block cipher.
Cook, Debra L.+2 more
core +2 more sources
An Enhancement Method Based on Modifying CFB Mode for Key Generation in AES Algorithm [PDF]
There are two very important characteristics in the block cipher, the amount of time for encryption process and key complexity which caused increasing the complexity of encryption process.
Hasanen S. Abdulah+2 more
doaj +1 more source
On Elastic Block Ciphers and Their Differential and Linear Cryptanalyses [PDF]
Motivated by applications such as databases with nonuniform field lengths, we introduce the concept of an elastic block cipher, a new approach to variable length block ciphers which incorporates fixed sized cipher components into a new network structure.
Cook, Debra L.+2 more
core +2 more sources