Results 11 to 20 of about 6,661,504 (214)
Extended Generalized Feistel Networks using Matrix Representation [PDF]
International audienceWhile Generalized Feistel Networks have been widely studied in the literature as a building block of a block cipher, we propose in this paper a unified vision to easily represent them through a matrix representation. We then propose
A Biryukov +23 more
core +6 more sources
Yoyo trick on type‐II generalised Feistel networks [PDF]
This work presents a structural attack against the type‐II generalised Feistel network (GFN) with secret internal functions. First, equivalent structures of the 7‐round type‐II GFN are provided, which helps reduce the first guess of the secret round ...
Tao Hou, Ting Cui
doaj +2 more sources
Information leakage of 1-Nested-Feistel network
Impossible differential cryptanalysis is a powerful tool to evaluate the strength of a block cipher structure. In this paper, we investigate the impossible differential property of Nested-Feistel networks, which is a famous block cipher network used in ...
Yaorui Cui, Xuchen Dong, Hui Guan
semanticscholar +2 more sources
The powers against the higher-order differential cryptanalysis of the single-SP(substitution-permutation) model and the double-SP model are studied in the type-1 Feistel network by analyzing the growths of algebraic degrees.
ONGLe D, UJiao D, UWen-ling W
doaj +3 more sources
FPE scheme based on k-splits Feistel network
The construction features and discipline of Feistel network-based FPE(format-preserving encryption)schemes were analyzed.Considering on the problem that 2-splits Feistel networks-based FPE cipher’s block size was in narrow range,a type-2 Feistel network ...
Jing-wei LI +3 more
doaj +3 more sources
Round Addition Using Faults for Generalized Feistel Network
SUMMARY This article presents a di ff erential fault analysis (DFA) technique using round addition for a generalized Feistel network (GFN) including CLEFIA and RC6.
H. Yoshikawa, M. Kaminaga, A. Shikoda
semanticscholar +3 more sources
Multiset Structural Attack on Generalized Feistel Networks [PDF]
In this paper, we present new generic multiset attacks against generalized Feistel networks, by which we can recover all the unknown round functions completely instead of deciding whether an unknown encryption oracle is such network or a random permutation.
Ruya Fan +4 more
openaire +1 more source
Type-3 Feistel Network of The 128-bits Block Size Improved Blowfish Cryptographic Encryption [PDF]
In this paper, a new secret-key block cipher called 128-bits Blowfish isproposed which is an evolutionary improvement of 64-bits Blowfish designed tomeet the requirements of the Advanced Encryption Standard (AES) to increasesecurity and to improve ...
Ashwaq T. Hashim
doaj +1 more source
An innovative approach for dynamic key dependent S-Box to enhance security of IoT systems
The Internet of Things (IoT) foresees pervasive and connected smart nodes that interact independently while offering varied services. Today, IoT nodes are a treasure house of data and hence security has become a major concern in IoT networks ...
Divya James, TKS Lakshmi Priya
doaj +1 more source
On groups generated by ciphers based on Feistel network
Исследуются шифры, построенные по схеме Фейстеля, у которых функции усложнения представляют собой одну или несколько итераций XSL-схемы. Приводятся достаточные условия, при которых итерационные преобразования таких шифров порождают знакопеременную группу.
V. Antipkin, Dmitrii O. Pasko
semanticscholar +1 more source

