Results 41 to 50 of about 6,661,504 (214)
On Fault Injections in Generalized Feistel Networks [PDF]
In this paper, we propose a generic method to assess the vulnerability to Differential Fault Analysis of generalized Feistel networks (GFN). This method is based on an in-depth analysis of the GFN properties. First the diffusion of faults is studied, both at the block level and at the S-box level, in order to have a fault which maximizes the number of ...
Le Bouder, Hélène +3 more
openaire +2 more sources
Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks
The Feistel construction is one of the most studied ways of building block ciphers. Several generalizations were then proposed in the literature, leading to the Generalized Feistel Network, where the round function first applies a classical Feistel ...
Patrick Derbez +3 more
doaj +1 more source
An Improvement of Serpent Algorithm [PDF]
An improvement to Serpent algorithm will be proposed . Serpent algorithm is a Feistel network , iterating a simple encryption function 32 times . The block size is 256 bits , and the key can be any length up to 256 bytes .
Saleh Al - Karaawy, Ashwaq Hashim
doaj +1 more source
Enabling secure data transmission for wireless sensor networks based IoT applications
The high volume of sensed and transferred data among nodes on wireless sensor networks makes it necessary to keep the data safe. This study offers an improved security mechanism, taking the application, security level, and bit error rate into account for
Uras Panahi, Cüneyt Bayılmış
doaj +1 more source
On Elastic Block Ciphers and Their Differential and Linear Cryptanalyses [PDF]
Motivated by applications such as databases with nonuniform field lengths, we introduce the concept of an elastic block cipher, a new approach to variable length block ciphers which incorporates fixed sized cipher components into a new network structure.
Cook, Debra L. +2 more
core +2 more sources
Feistel Networks Made Public, and Applications [PDF]
Feistel Network, consisting of a repeated application of the Feistel Transform, gives a very convenient and popular method for designing "cryptographically strong" permutations from corresponding "cryptographically strong" functions. Up to now, all usages of the Feistel Network, including the celebrated Luby-Rackoff's result, critically rely on (a) the
Yevgeniy Dodis, Prashant Puniya
openaire +1 more source
Improved Security Bounds for Generalized Feistel Networks
We revisit the security of various generalized Feistel networks. Concretely, for unbalanced, alternating, type-1, type-2, and type-3 Feistel networks built from random functions, we substantially improve the coupling analyzes of Hoang and Rogaway (CRYPTO 2010). For a tweakable blockcipher-based generalized Feistelnetwork proposed by Coron et al.
Shen, Yaobin, Guo, Chun, Wang, Lei
openaire +4 more sources
Analisis Perbandingan antara Algoritma Rijndael dan Algoritma Twofish dalam Penyandian Teks [PDF]
Kemudahan pengaksesan media komunikasi dengan memanfaatkan kemajuan teknologi informasi tentunya akan memberikan dampak bagi keamanan informasi atau pesan yang menggunakan media komunikasi tersebut.
Shulhan, I. (Izzat)
core +2 more sources
With the large-scale application of 5G in industrial production, the Internet of Things has become an important technology for various industries to achieve efficiency improvement and digital transformation with the help of the mobile edge computing.
Runchen Gao, Shen Li, Yuqi Gao, Rui Guo
doaj +1 more source
Weak Tweak-Keys for the CRAFT Block Cipher
CRAFT is a lightweight tweakable Substitution-Permutation-Network (SPN) block cipher optimized for efficient protection of its implementations against Differential Fault Analysis (DFA) attacks.
Gregor Leander, Shahram Rasoolzadeh
doaj +1 more source

