Segmented Block Cipher Algorithm Based on ASCII-Codes Maneuver
نویسندگان
چکیده
منابع مشابه
The MAGENTA Block Cipher Algorithm
4 Algebraic Properties 5 4.1 The Function f(x) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 4.2 The Function PE(x; y) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 4.3 Two Successive Combinations of . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 4.4 The Function T . . . . . . . . . . . . . . . . . ...
متن کاملBlock Cipher Based on Randomly Generated Quasigroups
Quasigroups are algebraic structures closely related to Latin squares which have many different applications. The construction of block cipher is based on quasigroup string transformation. This article describes a block cipher based Quasigroup of order 256, suitable for fast software encryption of messages written down in universal ASCII code. The novelty of this cipher lies on the fact that ev...
متن کاملNew Fixed Point Attacks on GOST2 Block Cipher
GOST block cipher designed in the 1970s and published in 1989 as the Soviet and Russian standard GOST 28147-89. In order to enhance the security of GOST block cipher after proposing various attacks on it, designers published a modified version of GOST, namely GOST2, in 2015 which has a new key schedule and explicit choice for S-boxes. In this paper, by using three exactly identical portions of ...
متن کاملa novel block cipher algorithm with feistel-like structure
block ciphers have wide applications for hardware and software implementations. in this paper, a new block cipher algorithm with provable security is proposed. the whole structure of the algorithm is novel and has a good encryption and decryption performance. additionally, it has good security with few number of rounds. the structure of the proposed algorithm consists of 4-rounds feistel-like w...
متن کاملStudy on the efficiency and fault tolerance of block cipher algorithm based on energy analysis
Block cipher is one of the most widely used cryptographic systems. It is a kind of symmetric cipher algorithm, which uses the same key for encryption and decryption. In essence, the block cipher is a permutation with a key, which divides the data into groups with equal length and is converted to the same length. At present, the main block cipher algorithm has high security, it is difficult to b...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computer Science
سال: 2017
ISSN: 1549-3636
DOI: 10.3844/jcssp.2017.748.755