Filters








13,166 Hits in 6.5 sec

A simplified and generalized treatment of DES related ciphers [article]

Liljana Babinkostova, Alyssa M. Bowden, Andrew M. Kimball, Kameryn J. Williams
2012 arXiv   pre-print
We construct a two round simplified version of DES that contains all the DES components and show that its set of encryption permutations is not a group under functional composition, it is not a pure cipher  ...  This work is a study of DES-like ciphers where the bitwise exclusive-or (XOR) operation in the underlying Feistel network is replaced by an arbitrary group operation.  ...  We gave careful attention to the known original design criteria for components of DES, particularly the substitution S-boxes, when we designed E-DES.  ... 
arXiv:1205.5613v2 fatcat:lvq5dprstnhkxpynpruxirhcei

A Simplified and Generalized Treatment of DES-Related Ciphers

L. Babinkostova, A. M. Bowden, A. M. Kimball, K. J. Williams
2014 Cryptologia  
We construct a two round simplified version of DES that contains all the DES components and show that its set of encryption permutations is not a group under functional composition, it is not a pure cipher  ...  This work is a study of DES-like ciphers where the bitwise exclusive-or (XOR) operation in the underlying Feistel network is replaced by an arbitrary group operation.  ...  We gave careful attention to the known original design criteria for components of DES, particularly the substitution S-boxes, when we designed E-DES.  ... 
doi:10.1080/01611194.2014.915255 fatcat:ztutn4ka2vegjafa27vvtbnr2u

Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules

Ashrujit Ghoshal, Rajat Sadhukhan, Sikhar Patranabis, Nilanjan Datta, Stjepan Picek, Debdeep Mukhopadhyay
2018 IACR Transactions on Symmetric Cryptology  
We finally illustrate design paradigms that combine the aforementioned TI circuits for S-Boxes and diffusion layers to obtain fully side-channel secure SPN block cipher implementations with low area and  ...  The core building blocks for our strategy are cryptographically optimal 4×4 S-Boxes, implemented via repeated iterations of simple cellular automata (CA) rules.  ...  We would also like to thank all the anonymous reviewers of FSE 2019 for helping improve the work. Debdeep would also like to thank his DST Swarnajayanti fellowship (2015-16) for partial support.  ... 
doi:10.46586/tosc.v2018.i3.311-334 fatcat:haxybsewgjaafc6viku4ihm5mu

Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules

Ashrujit Ghoshal, Rajat Sadhukhan, Sikhar Patranabis, Nilanjan Datta, Stjepan Picek, Debdeep Mukhopadhyay
2018 IACR Transactions on Symmetric Cryptology  
We finally illustrate design paradigms that combine the aforementioned TI circuits for S-Boxes and diffusion layers to obtain fully side-channel secure SPN block cipher implementations with low area and  ...  The core building blocks for our strategy are cryptographically optimal 4×4 S-Boxes, implemented via repeated iterations of simple cellular automata (CA) rules.  ...  We would also like to thank all the anonymous reviewers of FSE 2019 for helping improve the work. Debdeep would also like to thank his DST Swarnajayanti fellowship (2015-16) for partial support.  ... 
doi:10.13154/tosc.v2018.i3.311-334 dblp:journals/tosc/GhoshalSPDPM18 fatcat:qk6saovj3nge5lkgyadvyiehcy

Ensemble of Chaotic and Naive Approaches for Performance Enhancement in Video Encryption

Jeyamala Chandrasekaran, S. J. Thiruvengadam
2015 The Scientific World Journal  
This research work aims at enhancing the speed of naive approaches through chaos based S-box design.  ...  Experimental results confirm that chaos based S-box design and key generation significantly reduce the computational cost of video encryption with no compromise in security.  ...  Conflict of Interests The authors declare that there is no conflict of interests regarding the publication of this paper.  ... 
doi:10.1155/2015/458272 pmid:26550603 pmcid:PMC4621361 fatcat:r3wjjmwqlfhbpptfddm4lves5a

Systematization of a 256-bit lightweight block cipher Marvin [article]

Sukanya Saha, Krishnendu Rarhi, Abhishek Bhattacharya
2018 arXiv   pre-print
In this paper, we have proposed a new 256 bit lightweight block cipher named as Marvin, that belongs to the family of Extended LS designs.  ...  The rapid growth in the research field of lightweight cryptography can be seen from the list of the number of lightweight stream as well as block ciphers that has been proposed in the recent years.  ...  The round operations are a composition of the application of S boxes to the columns of the state,application of L boxes to the rows of the state,the application of PermuteSets to the set of bits of the  ... 
arXiv:1806.07051v1 fatcat:w6dh2lz6lvhj3ga5ss5ergsmnu

Quantitative Analysis and Comparison of Symmetric Cryptographic Security Algorithms

Mahaba Saad, Khalid Youssef, Hala Abdel-Kader
2016 Indonesian Journal of Electrical Engineering and Computer Science  
Hence the search for the best solution to offer the necessary protection against the data intruders' attacks along with providing these services in time is one of the most interesting subjects in the security  ...  <p>Nowadays, the rapid evolution of communication systems offers, to a very large percentage of population, access to a huge amount of information and a variety of means to use in order to exchange personal  ...  The structure of DES, 3DES uses fewer types of atomic and composite operations rotate shift left, XOR, and eight 6bit-to-4bit S-boxes.  ... 
doi:10.11591/ijeecs.v4.i1.pp116-124 fatcat:35k5osyt5fabxnb2vngt3fiwpy

Peer to Peer Communication between Android Device and PC and Video Surveillance using Android Device

Atul R.
2015 International Journal on Recent and Innovation Trends in Computing and Communication  
It also represents architecture to improve video surveillance using android Smart-phone. This system allows application dynamic composition which is increases the overall flexibility of the system.  ...  This system is useful for like viewing or browsing a file which is stored on a remote computer, saving image files and text files to the computer and handling control of a remote computer using a android  ...  In this stage, the substitution and permutation both functions are used. The role of S-boxes in the function f.  ... 
doi:10.17762/ijritcc2321-8169.150137 fatcat:ffoz22yyvbhmfh3vfcpva7wp24

Implementation of Modified Twofish Algorithm using 128 and 192-bit keys on VHDL

Purnima Gehlot, S. R. Biradar, B. P. Singh
2013 International Journal of Computer Applications  
Among these algorithms is Twofish, a promising 128-bit block cipher and one of the competitors in National Institute of Standards and Technology's (NIST) AES competition, for the replacement of DES at  ...  In this paper the security algorithm, twofish has been explained with all of its modules (some modules has been modified) for both 128 and 192-bit key size.  ...  Some building blocks of twofish algorithms are: S-Box Key dependent S-boxes are something new in a cipher design.  ... 
doi:10.5120/12024-8087 fatcat:hxeb2aqpqvfoni66xgqglrmina

Architecture of ASIP Crypto-Processor for Dynamic Runtime Security Applications

Mahaba Saad, Khalid Youssef, Mohamed Tarek, Hala Abdel-Kader
2016 Indonesian Journal of Electrical Engineering and Computer Science  
<p>Nowadays, demands of data security are increasing, especially after introduction of wireless communications to the masses.  ...  The quantitative analysis approach is a step towards optimizing the security operations for an efficient next generation family of network processors with enhanced speed and power performance.  ...  The structure of DES, 3DES uses fewer types of atomic and composite operations rotate shift left, XOR, and eight 6bit-to-4bit S-boxes.  ... 
doi:10.11591/ijeecs.v4.i2.pp412-423 fatcat:odao4wekznar5cmu7lhpptb73m

Lightweight Cryptography: Underlying Principles and Approaches

Sergey Panasenko, Sergey Smagin
2011 Journal of clean energy technologies  
Lightweight cryptography is a branch of the modern cryptography, which covers cryptographic algorithms intended for use in devices with low or extremely low resources.  ...  In this paper we propose generalized approaches to lightweight algorithms design. Also, we highlight some constraints and recommendations for implementation of lightweight algorithms.  ...  ACKNOWLEDGEMENT We would like to thank Alexander Domoratsky for reviewing and valuable comments on this paper.  ... 
doi:10.7763/ijcte.2011.v3.360 fatcat:saubobm3pbhi3hekp3qrkbr62a

Imprimitive Permutation Groups and Trapdoors in Iterated Block Ciphers [chapter]

Kenneth G. Paterson
1999 Lecture Notes in Computer Science  
An example of a DES-like cipher, resistant to both linear and differential cryptanalysis that generates an imprimitive group and is easily broken, is given.  ...  Some properties of the group generated by the round functions of such a cipher are known to be of cryptanalytic interest.  ...  Acknowledgements The author would like to thank Jim Massey for his encouragement during this research, and Lars Knudsen for patiently answering many questions and for his humour.  ... 
doi:10.1007/3-540-48519-8_15 fatcat:kdt7vnq55fbuljtnfmbmuitf64

A Power Associative Loop Structure For The Construction Of Non-Linear Components Of Block Cipher

Sadam Hussain, Sajjad Shaukat Jamal, Tariq Shah, Iqtadar Hussain
2020 IEEE Access  
The evaluation of proposed boxes with different algebraic and statistical analyses like nonlinearity test, strict avalanche criterion, bit independence criterion, linear approximation probability and differential  ...  To obtain the number of substitution boxes, we further applied the symmetric group of order 16 on the proposed substitution box.  ...  TABLE 9 . 9 SAC analysis of newly designed S-box with other S-boxes. TABLE 10 . 10 NPCR and UACI analysis of newly designed S-box with other S-boxes.  ... 
doi:10.1109/access.2020.3005087 fatcat:bikqrwwlqveczj6ead3dz67qme

Data Encryption Standard (DES) [chapter]

Bruce Schneier
2015 Applied Cryptography, Second Edition  
However, in spite of all the controversy it is hard to underestimate the role of DES.  ...  The structure of Lucifer was significantly altered and since the design rationale was never made public and the secret key size was reduced from 128-bit to 56-bits this initially resulted in controversy  ...  Each row of the S-box tables consists of a permutation of the 4-bit values 0, . . . , 15.  ... 
doi:10.1002/9781119183471.ch12 fatcat:y5k6pvuae5crnefms3herc5shi

A Novel Algorithm of Constructing Highly Nonlinear S-p-boxes

Yasir Naseer, Tariq Shah, Dawood Shah, Sadam Hussain
2019 Cryptography  
We named these newly designed substitution boxes (S-boxes) as substitution permutation boxes (S-p-boxes), because they serve as both substitution boxes (S-boxes) as well as permutation boxes (p-boxes).  ...  This method is based on composition of the action of symmetric group on Galois field and inversion map.  ...  Design for Proposed S-p-Boxes The design of the suggested S-p-box is dependent on the composition of action of symmetric group S 8 on to Galois field GF 2 8 and inversion map.  ... 
doi:10.3390/cryptography3010006 fatcat:hay5ezxr2ffm3ogabgpciibhea
« Previous Showing results 1 — 15 out of 13,166 results