Results 41 to 50 of about 6,661,504 (214)

On Fault Injections in Generalized Feistel Networks [PDF]

open access: yes2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2014
In this paper, we propose a generic method to assess the vulnerability to Differential Fault Analysis of generalized Feistel networks (GFN). This method is based on an in-depth analysis of the GFN properties. First the diffusion of faults is studied, both at the block level and at the S-box level, in order to have a fault which maximizes the number of ...
Le Bouder, Hélène   +3 more
openaire   +2 more sources

Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks

open access: yesIACR Transactions on Symmetric Cryptology, 2019
The Feistel construction is one of the most studied ways of building block ciphers. Several generalizations were then proposed in the literature, leading to the Generalized Feistel Network, where the round function first applies a classical Feistel ...
Patrick Derbez   +3 more
doaj   +1 more source

An Improvement of Serpent Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2005
An improvement to Serpent algorithm will be proposed . Serpent algorithm is a Feistel network , iterating a simple encryption function 32 times . The block size is 256 bits , and the key can be any length up to 256 bytes .
Saleh Al - Karaawy, Ashwaq Hashim
doaj   +1 more source

Enabling secure data transmission for wireless sensor networks based IoT applications

open access: yesAin Shams Engineering Journal, 2023
The high volume of sensed and transferred data among nodes on wireless sensor networks makes it necessary to keep the data safe. This study offers an improved security mechanism, taking the application, security level, and bit error rate into account for
Uras Panahi, Cüneyt Bayılmış
doaj   +1 more source

On Elastic Block Ciphers and Their Differential and Linear Cryptanalyses [PDF]

open access: yes, 2005
Motivated by applications such as databases with nonuniform field lengths, we introduce the concept of an elastic block cipher, a new approach to variable length block ciphers which incorporates fixed sized cipher components into a new network structure.
Cook, Debra L.   +2 more
core   +2 more sources

Feistel Networks Made Public, and Applications [PDF]

open access: yes, 2007
Feistel Network, consisting of a repeated application of the Feistel Transform, gives a very convenient and popular method for designing "cryptographically strong" permutations from corresponding "cryptographically strong" functions. Up to now, all usages of the Feistel Network, including the celebrated Luby-Rackoff's result, critically rely on (a) the
Yevgeniy Dodis, Prashant Puniya
openaire   +1 more source

Improved Security Bounds for Generalized Feistel Networks

open access: yesIACR Transactions on Symmetric Cryptology, 2020
We revisit the security of various generalized Feistel networks. Concretely, for unbalanced, alternating, type-1, type-2, and type-3 Feistel networks built from random functions, we substantially improve the coupling analyzes of Hoang and Rogaway (CRYPTO 2010). For a tweakable blockcipher-based generalized Feistelnetwork proposed by Coron et al.
Shen, Yaobin, Guo, Chun, Wang, Lei
openaire   +4 more sources

Analisis Perbandingan antara Algoritma Rijndael dan Algoritma Twofish dalam Penyandian Teks [PDF]

open access: yes, 2018
Kemudahan pengaksesan media komunikasi dengan memanfaatkan kemajuan teknologi informasi tentunya akan memberikan dampak bagi keamanan informasi atau pesan yang menggunakan media komunikasi tersebut.
Shulhan, I. (Izzat)
core   +2 more sources

A lightweight cryptographic algorithm for the transmission of images from road environments in self-driving

open access: yesCybersecurity, 2021
With the large-scale application of 5G in industrial production, the Internet of Things has become an important technology for various industries to achieve efficiency improvement and digital transformation with the help of the mobile edge computing.
Runchen Gao, Shen Li, Yuqi Gao, Rui Guo
doaj   +1 more source

Weak Tweak-Keys for the CRAFT Block Cipher

open access: yesIACR Transactions on Symmetric Cryptology, 2022
CRAFT is a lightweight tweakable Substitution-Permutation-Network (SPN) block cipher optimized for efficient protection of its implementations against Differential Fault Analysis (DFA) attacks.
Gregor Leander, Shahram Rasoolzadeh
doaj   +1 more source

Home - About - Disclaimer - Privacy