The Internet Archive has a preservation copy of this work in our general collections.
The file type is application/pdf
.
Filters
A simplified and generalized treatment of DES related ciphers
[article]
2012
arXiv
pre-print
We construct a two round simplified version of DES that contains all the DES components and show that its set of encryption permutations is not a group under functional composition, it is not a pure cipher ...
This work is a study of DES-like ciphers where the bitwise exclusive-or (XOR) operation in the underlying Feistel network is replaced by an arbitrary group operation. ...
We gave careful attention to the known original design criteria for components of DES, particularly the substitution S-boxes, when we designed E-DES. ...
arXiv:1205.5613v2
fatcat:lvq5dprstnhkxpynpruxirhcei
A Simplified and Generalized Treatment of DES-Related Ciphers
2014
Cryptologia
We construct a two round simplified version of DES that contains all the DES components and show that its set of encryption permutations is not a group under functional composition, it is not a pure cipher ...
This work is a study of DES-like ciphers where the bitwise exclusive-or (XOR) operation in the underlying Feistel network is replaced by an arbitrary group operation. ...
We gave careful attention to the known original design criteria for components of DES, particularly the substitution S-boxes, when we designed E-DES. ...
doi:10.1080/01611194.2014.915255
fatcat:ztutn4ka2vegjafa27vvtbnr2u
Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules
2018
IACR Transactions on Symmetric Cryptology
We finally illustrate design paradigms that combine the aforementioned TI circuits for S-Boxes and diffusion layers to obtain fully side-channel secure SPN block cipher implementations with low area and ...
The core building blocks for our strategy are cryptographically optimal 4×4 S-Boxes, implemented via repeated iterations of simple cellular automata (CA) rules. ...
We would also like to thank all the anonymous reviewers of FSE 2019 for helping improve the work. Debdeep would also like to thank his DST Swarnajayanti fellowship (2015-16) for partial support. ...
doi:10.46586/tosc.v2018.i3.311-334
fatcat:haxybsewgjaafc6viku4ihm5mu
Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules
2018
IACR Transactions on Symmetric Cryptology
We finally illustrate design paradigms that combine the aforementioned TI circuits for S-Boxes and diffusion layers to obtain fully side-channel secure SPN block cipher implementations with low area and ...
The core building blocks for our strategy are cryptographically optimal 4×4 S-Boxes, implemented via repeated iterations of simple cellular automata (CA) rules. ...
We would also like to thank all the anonymous reviewers of FSE 2019 for helping improve the work. Debdeep would also like to thank his DST Swarnajayanti fellowship (2015-16) for partial support. ...
doi:10.13154/tosc.v2018.i3.311-334
dblp:journals/tosc/GhoshalSPDPM18
fatcat:qk6saovj3nge5lkgyadvyiehcy
Ensemble of Chaotic and Naive Approaches for Performance Enhancement in Video Encryption
2015
The Scientific World Journal
This research work aims at enhancing the speed of naive approaches through chaos based S-box design. ...
Experimental results confirm that chaos based S-box design and key generation significantly reduce the computational cost of video encryption with no compromise in security. ...
Conflict of Interests The authors declare that there is no conflict of interests regarding the publication of this paper. ...
doi:10.1155/2015/458272
pmid:26550603
pmcid:PMC4621361
fatcat:r3wjjmwqlfhbpptfddm4lves5a
Systematization of a 256-bit lightweight block cipher Marvin
[article]
2018
arXiv
pre-print
In this paper, we have proposed a new 256 bit lightweight block cipher named as Marvin, that belongs to the family of Extended LS designs. ...
The rapid growth in the research field of lightweight cryptography can be seen from the list of the number of lightweight stream as well as block ciphers that has been proposed in the recent years. ...
The round operations are a composition of the application of S boxes to the columns of the state,application of L boxes to the rows of the state,the application of PermuteSets to the set of bits of the ...
arXiv:1806.07051v1
fatcat:w6dh2lz6lvhj3ga5ss5ergsmnu
Quantitative Analysis and Comparison of Symmetric Cryptographic Security Algorithms
2016
Indonesian Journal of Electrical Engineering and Computer Science
Hence the search for the best solution to offer the necessary protection against the data intruders' attacks along with providing these services in time is one of the most interesting subjects in the security ...
<p>Nowadays, the rapid evolution of communication systems offers, to a very large percentage of population, access to a huge amount of information and a variety of means to use in order to exchange personal ...
The structure of DES, 3DES uses fewer types of atomic and composite operations rotate shift left, XOR, and eight 6bit-to-4bit S-boxes. ...
doi:10.11591/ijeecs.v4.i1.pp116-124
fatcat:35k5osyt5fabxnb2vngt3fiwpy
Peer to Peer Communication between Android Device and PC and Video Surveillance using Android Device
2015
International Journal on Recent and Innovation Trends in Computing and Communication
It also represents architecture to improve video surveillance using android Smart-phone. This system allows application dynamic composition which is increases the overall flexibility of the system. ...
This system is useful for like viewing or browsing a file which is stored on a remote computer, saving image files and text files to the computer and handling control of a remote computer using a android ...
In this stage, the substitution and permutation both functions are used. The role of S-boxes in the function f. ...
doi:10.17762/ijritcc2321-8169.150137
fatcat:ffoz22yyvbhmfh3vfcpva7wp24
Implementation of Modified Twofish Algorithm using 128 and 192-bit keys on VHDL
2013
International Journal of Computer Applications
Among these algorithms is Twofish, a promising 128-bit block cipher and one of the competitors in National Institute of Standards and Technology's (NIST) AES competition, for the replacement of DES at ...
In this paper the security algorithm, twofish has been explained with all of its modules (some modules has been modified) for both 128 and 192-bit key size. ...
Some building blocks of twofish algorithms are:
S-Box Key dependent S-boxes are something new in a cipher design. ...
doi:10.5120/12024-8087
fatcat:hxeb2aqpqvfoni66xgqglrmina
Architecture of ASIP Crypto-Processor for Dynamic Runtime Security Applications
2016
Indonesian Journal of Electrical Engineering and Computer Science
<p>Nowadays, demands of data security are increasing, especially after introduction of wireless communications to the masses. ...
The quantitative analysis approach is a step towards optimizing the security operations for an efficient next generation family of network processors with enhanced speed and power performance. ...
The structure of DES, 3DES uses fewer types of atomic and composite operations rotate shift left, XOR, and eight 6bit-to-4bit S-boxes. ...
doi:10.11591/ijeecs.v4.i2.pp412-423
fatcat:odao4wekznar5cmu7lhpptb73m
Lightweight Cryptography: Underlying Principles and Approaches
2011
Journal of clean energy technologies
Lightweight cryptography is a branch of the modern cryptography, which covers cryptographic algorithms intended for use in devices with low or extremely low resources. ...
In this paper we propose generalized approaches to lightweight algorithms design. Also, we highlight some constraints and recommendations for implementation of lightweight algorithms. ...
ACKNOWLEDGEMENT We would like to thank Alexander Domoratsky for reviewing and valuable comments on this paper. ...
doi:10.7763/ijcte.2011.v3.360
fatcat:saubobm3pbhi3hekp3qrkbr62a
Imprimitive Permutation Groups and Trapdoors in Iterated Block Ciphers
[chapter]
1999
Lecture Notes in Computer Science
An example of a DES-like cipher, resistant to both linear and differential cryptanalysis that generates an imprimitive group and is easily broken, is given. ...
Some properties of the group generated by the round functions of such a cipher are known to be of cryptanalytic interest. ...
Acknowledgements The author would like to thank Jim Massey for his encouragement during this research, and Lars Knudsen for patiently answering many questions and for his humour. ...
doi:10.1007/3-540-48519-8_15
fatcat:kdt7vnq55fbuljtnfmbmuitf64
A Power Associative Loop Structure For The Construction Of Non-Linear Components Of Block Cipher
2020
IEEE Access
The evaluation of proposed boxes with different algebraic and statistical analyses like nonlinearity test, strict avalanche criterion, bit independence criterion, linear approximation probability and differential ...
To obtain the number of substitution boxes, we further applied the symmetric group of order 16 on the proposed substitution box. ...
TABLE 9 . 9 SAC analysis of newly designed S-box with other S-boxes.
TABLE 10 . 10 NPCR and UACI analysis of newly designed S-box with other S-boxes. ...
doi:10.1109/access.2020.3005087
fatcat:bikqrwwlqveczj6ead3dz67qme
Data Encryption Standard (DES)
[chapter]
2015
Applied Cryptography, Second Edition
However, in spite of all the controversy it is hard to underestimate the role of DES. ...
The structure of Lucifer was significantly altered and since the design rationale was never made public and the secret key size was reduced from 128-bit to 56-bits this initially resulted in controversy ...
Each row of the S-box tables consists of a permutation of the 4-bit values 0, . . . , 15. ...
doi:10.1002/9781119183471.ch12
fatcat:y5k6pvuae5crnefms3herc5shi
A Novel Algorithm of Constructing Highly Nonlinear S-p-boxes
2019
Cryptography
We named these newly designed substitution boxes (S-boxes) as substitution permutation boxes (S-p-boxes), because they serve as both substitution boxes (S-boxes) as well as permutation boxes (p-boxes). ...
This method is based on composition of the action of symmetric group on Galois field and inversion map. ...
Design for Proposed S-p-Boxes The design of the suggested S-p-box is dependent on the composition of action of symmetric group S 8 on to Galois field GF 2 8 and inversion map. ...
doi:10.3390/cryptography3010006
fatcat:hay5ezxr2ffm3ogabgpciibhea
« Previous
Showing results 1 — 15 out of 13,166 results