Results 1 to 10 of about 6,728,968 (223)

Cryptanalysis and Improvement of the Image Encryption Scheme Based on Feistel Network and Dynamic DNA Encoding

open access: yesIEEE Access, 2021
In order to improve the security and efficiency of image encryption, many researchers have continuously proposed new image encryption schemes in recent years. However, these image encryption schemes have not been fully analyzed and evaluated.
Wei Feng   +3 more
doaj   +4 more sources

An Image Encryption Method Based on the Feistel Network and Dynamic DNA Encoding

open access: yesIEEE Photonics Journal, 2018
Based on the Feistel network and dynamic deoxyribonucleic acid (DNA) encoding technology, an image encryption method is proposed using the “permutation–diffusion–scrambling” structure.
Xuncai Zhang, Zheng Zhou, Ying Niu
doaj   +4 more sources

Integrating Quadratic Polynomial and Symbolic Chaotic Map-Based Feistel Network to Improve Image Encryption Performance

open access: yesIEEE Access
This research introduces an innovative image encryption method that amalgamates two secure and efficient chaotic maps, namely a 2D Simplified Quadratic Polynomial Map (2D-SQPM) and a 2D Symbolic Chaotic Map (2D-SCM), within an enhanced Feistel network ...
Edy Winarno   +3 more
doaj   +4 more sources

Model of nonconventional encryption algorithm based on nested Feistel network

open access: yesOpen Engineering, 2016
The purpose of research - studying the possibilities of practical application of the encryption algorithm based on nonpositional polynomial notations using nested Feistel network.
Nyssanbayeva Saule   +2 more
doaj   +4 more sources

Extended Generalized Feistel Networks Using Matrix Representation [PDF]

open access: yes, 2014
While Generalized Feistel Networks have been widely studied in the literature as a building block of a block cipher, we propose in this paper a unified vision to easily represent them through a matrix representation. We then propose a new class of such schemes called Extended Generalized Feistel Networks well suited for cryptographic applications.
Berger, Thierry Pierre   +2 more
openaire   +6 more sources

Yoyo trick on type‐II generalised Feistel networks [PDF]

open access: yesIET Information Security, 2021
This work presents a structural attack against the type‐II generalised Feistel network (GFN) with secret internal functions. First, equivalent structures of the 7‐round type‐II GFN are provided, which helps reduce the first guess of the secret round ...
Tao Hou, Ting Cui
doaj   +2 more sources

Distinguishers for 4-Branch and 8-Branch Generalized Feistel Network

open access: yesIEEE Access, 2017
In this paper, we present an eight round distinguisher for four-branch type-2 generalized Feistel network (GFN) with double-SP (DSP) functions and two distinguishers for eight-branch type-2 GFN with single-SP (SSP) functions in a known key attack (KKA ...
Donghoon Chang   +2 more
doaj   +2 more sources

Algebraic Insights into the Secret Feistel Network [PDF]

open access: yesFast Software Encryption Workshop, 2016
We introduce the high-degree indicator matrix HDIM, an object closely related with both the linear approximation table and the algebraic normal form ANF of a permutation. We show that the HDIM of a Feistel Network contains very specific patterns depending on the degree of the Feistel functions, the number of rounds and whether the Feistel functions are
Léo Perrin, A. Udovenko
semanticscholar   +3 more sources

Information leakage of 1-Nested-Feistel network

open access: yesJournal of Physics: Conference Series, 2018
Impossible differential cryptanalysis is a powerful tool to evaluate the strength of a block cipher structure. In this paper, we investigate the impossible differential property of Nested-Feistel networks, which is a famous block cipher network used in ...
Yaorui Cui, Xuchen Dong, Hui Guan
semanticscholar   +2 more sources

A secure fingerprint hiding technique based on DNA sequence and mathematical function [PDF]

open access: yesPeerJ Computer Science
DNA steganography is a technique for securely transmitting important data using DNA sequences. It involves encrypting and hiding messages within DNA sequences to prevent unauthorized access and decoding of sensitive information.
Wala’a Essa Al-Ahmadi   +3 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy