Results 21 to 30 of about 164 (126)
An Image Encryption Method Based on the Feistel Network and Dynamic DNA Encoding
Based on the Feistel network and dynamic deoxyribonucleic acid (DNA) encoding technology, an image encryption method is proposed using the “permutation–diffusion–scrambling” structure.
Xuncai Zhang, Zheng Zhou, Ying Niu
doaj +1 more source
An Improvement of Serpent Algorithm [PDF]
An improvement to Serpent algorithm will be proposed . Serpent algorithm is a Feistel network , iterating a simple encryption function 32 times . The block size is 256 bits , and the key can be any length up to 256 bytes .
Saleh Al - Karaawy, Ashwaq Hashim
doaj +1 more source
End-to-End Encryption in Resource-Constrained IoT Device
Internet of Things (IoT) technologies will interconnect with a wide range of network devices, regardless of their local network and resource capacities.
Ala Saleh D. Alluhaidan, P. Prabu
doaj +1 more source
Integral Cryptanalysis of WARP based on Monomial Prediction
WARP is a 128-bit block cipher published by Banik et al. at SAC 2020 as a lightweight alternative to AES. It is based on a generalized Feistel network and achieves the smallest area footprint among 128-bit block ciphers in many settings.
Hosein Hadipour, Maria Eichlseder
doaj +1 more source
PENGGUNAAN INVERS MATRIKS DALAM MODIFIKASI FEISTEL CIPHER
Umumnya, pada algoritma kriptografi modern sistem yang digunakan adalah sistem bit. Namun, hal tersebut membuat cipherteks semakin sulit untuk dipecahkan. Saat ini, Feistel cipher merupakan salah satu algoritma kriptografi modern yang banyak digunakan karena proses pengimplementasiannya yang cukup sederhana.
Sisilia Sylviani +3 more
openaire +1 more source
Quaternion Feistel Cipher with an Infinite Key Space Based on Quaternion Julia Sets
In this paper Quaternion Feistel Cipher (QFC) with an infinite key space based on quaternion Julia sets is proposed. The basic structure of the algorithm is based on the scheme proposed in 2012 by Sastry and Kumar.
Mariusz Dzwonkowski, Roman Rykaczewski
doaj +1 more source
In this paper, we propose related-key differential distinguishers based on the complementation property of Feistel ciphers. We show that with relaxed requirements on the complementation, i.e. the property does not have to hold for all keys and the complementation does not have to be on all bits, one can obtain a variety of distinguishers.
Biryukov, Alex, Nikolic, Ivica
openaire +2 more sources
FPE scheme based on k-splits Feistel network
The construction features and discipline of Feistel network-based FPE(format-preserving encryption)schemes were analyzed.Considering on the problem that 2-splits Feistel networks-based FPE cipher’s block size was in narrow range,a type-2 Feistel network ...
Jing-wei LI +3 more
doaj +2 more sources
Elastic Block Ciphers: The Feistel Cipher Case
We discuss the elastic versions of block ciphers whose round function processes subsets of bits from the data block differently, such as occurs in a Feistel network and in MISTY1. We focus on how specific bits are selected to be swapped after each round when forming the elastic version, using an elastic version of MISTY1 and differential cryptanalysis ...
Cook, Debra L. +2 more
openaire +2 more sources
One of the main security requirements for symmetric-key block ciphers is resistance against differential cryptanalysis. This is commonly assessed by counting the number of active substitution boxes (S-boxes) using search algorithms or mathematical ...
Mohamed Fadl Idris +3 more
doaj +1 more source

