Results 21 to 30 of about 164 (126)

An Image Encryption Method Based on the Feistel Network and Dynamic DNA Encoding

open access: yesIEEE Photonics Journal, 2018
Based on the Feistel network and dynamic deoxyribonucleic acid (DNA) encoding technology, an image encryption method is proposed using the “permutation–diffusion–scrambling” structure.
Xuncai Zhang, Zheng Zhou, Ying Niu
doaj   +1 more source

An Improvement of Serpent Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2005
An improvement to Serpent algorithm will be proposed . Serpent algorithm is a Feistel network , iterating a simple encryption function 32 times . The block size is 256 bits , and the key can be any length up to 256 bytes .
Saleh Al - Karaawy, Ashwaq Hashim
doaj   +1 more source

End-to-End Encryption in Resource-Constrained IoT Device

open access: yesIEEE Access, 2023
Internet of Things (IoT) technologies will interconnect with a wide range of network devices, regardless of their local network and resource capacities.
Ala Saleh D. Alluhaidan, P. Prabu
doaj   +1 more source

Integral Cryptanalysis of WARP based on Monomial Prediction

open access: yesIACR Transactions on Symmetric Cryptology, 2022
WARP is a 128-bit block cipher published by Banik et al. at SAC 2020 as a lightweight alternative to AES. It is based on a generalized Feistel network and achieves the smallest area footprint among 128-bit block ciphers in many settings.
Hosein Hadipour, Maria Eichlseder
doaj   +1 more source

PENGGUNAAN INVERS MATRIKS DALAM MODIFIKASI FEISTEL CIPHER

open access: yesFIBONACCI: Jurnal Pendidikan Matematika dan Matematika, 2022
Umumnya, pada algoritma kriptografi modern sistem yang digunakan adalah sistem bit. Namun, hal tersebut membuat cipherteks semakin sulit untuk dipecahkan. Saat ini, Feistel cipher merupakan salah satu algoritma kriptografi modern yang banyak digunakan karena proses pengimplementasiannya yang cukup sederhana.
Sisilia Sylviani   +3 more
openaire   +1 more source

Quaternion Feistel Cipher with an Infinite Key Space Based on Quaternion Julia Sets

open access: yesJournal of Telecommunications and Information Technology, 2015
In this paper Quaternion Feistel Cipher (QFC) with an infinite key space based on quaternion Julia sets is proposed. The basic structure of the algorithm is based on the scheme proposed in 2012 by Sastry and Kumar.
Mariusz Dzwonkowski, Roman Rykaczewski
doaj   +1 more source

Complementing Feistel Ciphers

open access: yes, 2014
In this paper, we propose related-key differential distinguishers based on the complementation property of Feistel ciphers. We show that with relaxed requirements on the complementation, i.e. the property does not have to hold for all keys and the complementation does not have to be on all bits, one can obtain a variety of distinguishers.
Biryukov, Alex, Nikolic, Ivica
openaire   +2 more sources

FPE scheme based on k-splits Feistel network

open access: yesTongxin xuebao, 2012
The construction features and discipline of Feistel network-based FPE(format-preserving encryption)schemes were analyzed.Considering on the problem that 2-splits Feistel networks-based FPE cipher’s block size was in narrow range,a type-2 Feistel network ...
Jing-wei LI   +3 more
doaj   +2 more sources

Elastic Block Ciphers: The Feistel Cipher Case

open access: yes, 2004
We discuss the elastic versions of block ciphers whose round function processes subsets of bits from the data block differently, such as occurs in a Feistel network and in MISTY1. We focus on how specific bits are selected to be swapped after each round when forming the elastic version, using an elastic version of MISTY1 and differential cryptanalysis ...
Cook, Debra L.   +2 more
openaire   +2 more sources

A Deep Learning Approach for Active S-Box Prediction of Lightweight Generalized Feistel Block Ciphers

open access: yesIEEE Access, 2021
One of the main security requirements for symmetric-key block ciphers is resistance against differential cryptanalysis. This is commonly assessed by counting the number of active substitution boxes (S-boxes) using search algorithms or mathematical ...
Mohamed Fadl Idris   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy