Results 31 to 40 of about 3,394 (194)
Analisis Perbandingan antara Algoritma Rijndael dan Algoritma Twofish dalam Penyandian Teks [PDF]
Kemudahan pengaksesan media komunikasi dengan memanfaatkan kemajuan teknologi informasi tentunya akan memberikan dampak bagi keamanan informasi atau pesan yang menggunakan media komunikasi tersebut.
Shulhan, I. (Izzat)
core +2 more sources
Integral Cryptanalysis of WARP based on Monomial Prediction
WARP is a 128-bit block cipher published by Banik et al. at SAC 2020 as a lightweight alternative to AES. It is based on a generalized Feistel network and achieves the smallest area footprint among 128-bit block ciphers in many settings.
Hosein Hadipour, Maria Eichlseder
doaj +1 more source
PENGGUNAAN INVERS MATRIKS DALAM MODIFIKASI FEISTEL CIPHER
Umumnya, pada algoritma kriptografi modern sistem yang digunakan adalah sistem bit. Namun, hal tersebut membuat cipherteks semakin sulit untuk dipecahkan. Saat ini, Feistel cipher merupakan salah satu algoritma kriptografi modern yang banyak digunakan karena proses pengimplementasiannya yang cukup sederhana.
Sisilia Sylviani +3 more
openaire +1 more source
Quaternion Feistel Cipher with an Infinite Key Space Based on Quaternion Julia Sets
In this paper Quaternion Feistel Cipher (QFC) with an infinite key space based on quaternion Julia sets is proposed. The basic structure of the algorithm is based on the scheme proposed in 2012 by Sastry and Kumar.
Mariusz Dzwonkowski, Roman Rykaczewski
doaj +1 more source
In this paper, we propose related-key differential distinguishers based on the complementation property of Feistel ciphers. We show that with relaxed requirements on the complementation, i.e. the property does not have to hold for all keys and the complementation does not have to be on all bits, one can obtain a variety of distinguishers.
Biryukov, Alex, Nikolic, Ivica
openaire +2 more sources
FPE scheme based on k-splits Feistel network
The construction features and discipline of Feistel network-based FPE(format-preserving encryption)schemes were analyzed.Considering on the problem that 2-splits Feistel networks-based FPE cipher’s block size was in narrow range,a type-2 Feistel network ...
Jing-wei LI +3 more
doaj +2 more sources
Elastic Block Ciphers: The Feistel Cipher Case
We discuss the elastic versions of block ciphers whose round function processes subsets of bits from the data block differently, such as occurs in a Feistel network and in MISTY1. We focus on how specific bits are selected to be swapped after each round when forming the elastic version, using an elastic version of MISTY1 and differential cryptanalysis ...
Cook, Debra L. +2 more
openaire +2 more sources
Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes
Since Knudsen and Rijmen proposed the known-key attacks in ASIACRYPT 2007, the open-key model becomes more and more popular. As the other component of the open-key model, chosen-key model was applied to the full attacks on AES-256 by Biryukov et al.
Xiaoyang Dong, Xiaoyun Wang
doaj +1 more source
One of the main security requirements for symmetric-key block ciphers is resistance against differential cryptanalysis. This is commonly assessed by counting the number of active substitution boxes (S-boxes) using search algorithms or mathematical ...
Mohamed Fadl Idris +3 more
doaj +1 more source
On Elastic Block Ciphers and Their Differential and Linear Cryptanalyses [PDF]
Motivated by applications such as databases with nonuniform field lengths, we introduce the concept of an elastic block cipher, a new approach to variable length block ciphers which incorporates fixed sized cipher components into a new network structure.
Cook, Debra L. +2 more
core +2 more sources

