Results 11 to 20 of about 6,661,504 (214)

Extended Generalized Feistel Networks using Matrix Representation [PDF]

open access: yes, 2013
International audienceWhile Generalized Feistel Networks have been widely studied in the literature as a building block of a block cipher, we propose in this paper a unified vision to easily represent them through a matrix representation. We then propose
A Biryukov   +23 more
core   +6 more sources

Yoyo trick on type‐II generalised Feistel networks [PDF]

open access: yesIET Information Security, 2021
This work presents a structural attack against the type‐II generalised Feistel network (GFN) with secret internal functions. First, equivalent structures of the 7‐round type‐II GFN are provided, which helps reduce the first guess of the secret round ...
Tao Hou, Ting Cui
doaj   +2 more sources

Information leakage of 1-Nested-Feistel network

open access: yesJournal of Physics: Conference Series, 2018
Impossible differential cryptanalysis is a powerful tool to evaluate the strength of a block cipher structure. In this paper, we investigate the impossible differential property of Nested-Feistel networks, which is a famous block cipher network used in ...
Yaorui Cui, Xuchen Dong, Hui Guan
semanticscholar   +2 more sources

Higher-order differences based research on comparison between type-1 generalized Feistel-SP network and Feistel-SPSP network

open access: yesTongxin xuebao, 2014
The powers against the higher-order differential cryptanalysis of the single-SP(substitution-permutation) model and the double-SP model are studied in the type-1 Feistel network by analyzing the growths of algebraic degrees.
ONGLe D, UJiao D, UWen-ling W
doaj   +3 more sources

FPE scheme based on k-splits Feistel network

open access: yesTongxin xuebao, 2012
The construction features and discipline of Feistel network-based FPE(format-preserving encryption)schemes were analyzed.Considering on the problem that 2-splits Feistel networks-based FPE cipher’s block size was in narrow range,a type-2 Feistel network ...
Jing-wei LI   +3 more
doaj   +3 more sources

Round Addition Using Faults for Generalized Feistel Network

open access: yesIEICE Transactions on Information and Systems, 2013
SUMMARY This article presents a di ff erential fault analysis (DFA) technique using round addition for a generalized Feistel network (GFN) including CLEFIA and RC6.
H. Yoshikawa, M. Kaminaga, A. Shikoda
semanticscholar   +3 more sources

Multiset Structural Attack on Generalized Feistel Networks [PDF]

open access: yesMathematical Problems in Engineering, 2019
In this paper, we present new generic multiset attacks against generalized Feistel networks, by which we can recover all the unknown round functions completely instead of deciding whether an unknown encryption oracle is such network or a random permutation.
Ruya Fan   +4 more
openaire   +1 more source

Type-3 Feistel Network of The 128-bits Block Size Improved Blowfish Cryptographic Encryption [PDF]

open access: yesEngineering and Technology Journal, 2009
In this paper, a new secret-key block cipher called 128-bits Blowfish isproposed which is an evolutionary improvement of 64-bits Blowfish designed tomeet the requirements of the Advanced Encryption Standard (AES) to increasesecurity and to improve ...
Ashwaq T. Hashim
doaj   +1 more source

An innovative approach for dynamic key dependent S-Box to enhance security of IoT systems

open access: yesMeasurement: Sensors, 2023
The Internet of Things (IoT) foresees pervasive and connected smart nodes that interact independently while offering varied services. Today, IoT nodes are a treasure house of data and hence security has become a major concern in IoT networks ...
Divya James, TKS Lakshmi Priya
doaj   +1 more source

On groups generated by ciphers based on Feistel network

open access: yesMatematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography], 2021
Исследуются шифры, построенные по схеме Фейстеля, у которых функции усложнения представляют собой одну или несколько итераций XSL-схемы. Приводятся достаточные условия, при которых итерационные преобразования таких шифров порождают знакопеременную группу.
V. Antipkin, Dmitrii O. Pasko
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy