Results 31 to 40 of about 3,394 (194)

Analisis Perbandingan antara Algoritma Rijndael dan Algoritma Twofish dalam Penyandian Teks [PDF]

open access: yes, 2018
Kemudahan pengaksesan media komunikasi dengan memanfaatkan kemajuan teknologi informasi tentunya akan memberikan dampak bagi keamanan informasi atau pesan yang menggunakan media komunikasi tersebut.
Shulhan, I. (Izzat)
core   +2 more sources

Integral Cryptanalysis of WARP based on Monomial Prediction

open access: yesIACR Transactions on Symmetric Cryptology, 2022
WARP is a 128-bit block cipher published by Banik et al. at SAC 2020 as a lightweight alternative to AES. It is based on a generalized Feistel network and achieves the smallest area footprint among 128-bit block ciphers in many settings.
Hosein Hadipour, Maria Eichlseder
doaj   +1 more source

PENGGUNAAN INVERS MATRIKS DALAM MODIFIKASI FEISTEL CIPHER

open access: yesFIBONACCI: Jurnal Pendidikan Matematika dan Matematika, 2022
Umumnya, pada algoritma kriptografi modern sistem yang digunakan adalah sistem bit. Namun, hal tersebut membuat cipherteks semakin sulit untuk dipecahkan. Saat ini, Feistel cipher merupakan salah satu algoritma kriptografi modern yang banyak digunakan karena proses pengimplementasiannya yang cukup sederhana.
Sisilia Sylviani   +3 more
openaire   +1 more source

Quaternion Feistel Cipher with an Infinite Key Space Based on Quaternion Julia Sets

open access: yesJournal of Telecommunications and Information Technology, 2015
In this paper Quaternion Feistel Cipher (QFC) with an infinite key space based on quaternion Julia sets is proposed. The basic structure of the algorithm is based on the scheme proposed in 2012 by Sastry and Kumar.
Mariusz Dzwonkowski, Roman Rykaczewski
doaj   +1 more source

Complementing Feistel Ciphers

open access: yes, 2014
In this paper, we propose related-key differential distinguishers based on the complementation property of Feistel ciphers. We show that with relaxed requirements on the complementation, i.e. the property does not have to hold for all keys and the complementation does not have to be on all bits, one can obtain a variety of distinguishers.
Biryukov, Alex, Nikolic, Ivica
openaire   +2 more sources

FPE scheme based on k-splits Feistel network

open access: yesTongxin xuebao, 2012
The construction features and discipline of Feistel network-based FPE(format-preserving encryption)schemes were analyzed.Considering on the problem that 2-splits Feistel networks-based FPE cipher’s block size was in narrow range,a type-2 Feistel network ...
Jing-wei LI   +3 more
doaj   +2 more sources

Elastic Block Ciphers: The Feistel Cipher Case

open access: yes, 2004
We discuss the elastic versions of block ciphers whose round function processes subsets of bits from the data block differently, such as occurs in a Feistel network and in MISTY1. We focus on how specific bits are selected to be swapped after each round when forming the elastic version, using an elastic version of MISTY1 and differential cryptanalysis ...
Cook, Debra L.   +2 more
openaire   +2 more sources

Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes

open access: yesIACR Transactions on Symmetric Cryptology, 2016
Since Knudsen and Rijmen proposed the known-key attacks in ASIACRYPT 2007, the open-key model becomes more and more popular. As the other component of the open-key model, chosen-key model was applied to the full attacks on AES-256 by Biryukov et al.
Xiaoyang Dong, Xiaoyun Wang
doaj   +1 more source

A Deep Learning Approach for Active S-Box Prediction of Lightweight Generalized Feistel Block Ciphers

open access: yesIEEE Access, 2021
One of the main security requirements for symmetric-key block ciphers is resistance against differential cryptanalysis. This is commonly assessed by counting the number of active substitution boxes (S-boxes) using search algorithms or mathematical ...
Mohamed Fadl Idris   +3 more
doaj   +1 more source

On Elastic Block Ciphers and Their Differential and Linear Cryptanalyses [PDF]

open access: yes, 2005
Motivated by applications such as databases with nonuniform field lengths, we introduce the concept of an elastic block cipher, a new approach to variable length block ciphers which incorporates fixed sized cipher components into a new network structure.
Cook, Debra L.   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy