SPN Block cipher SSB having same structure in encryption and decryption

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Distributing the Encryption and Decryption of a Block Cipher

In threshold cryptography the goal is to distribute the computation of basic cryptographic primitives across a number of nodes in order to relax trust assumptions on individual nodes, as well as to introduce a level of fault-tolerance against node compromise. Most threshold cryptography has previously looked at the distribution of public key primitives, particularly threshold signatures and thr...

متن کامل

A New Encryption and Decryption Algorithm for Block Cipher Using Cellular Automata Rules

A novel cryptographic algorithm mainly depends on the cellular automata .In order to get the randomness using cellular automata concept. In this algorithm we have mainly concentrated on cellular automata module we have 8 different rules for different rounds .In previous algorithm the message and key size was 128bit, but in this project we have increased the message and key bit size to 256bit an...

متن کامل

Image Encryption Using Chaos and Block Cipher

In this paper, a novel image encryption scheme is proposed based on combination of pixel shuffling and new modified version of simplified AES. Chaotic baker’s map is used for shuffling and improving S-AES efficiency through S-box design. Chaos is used to expand diffusion and confusion in the image. Due to sensitivity to initial conditions, chaotic baker’s map has a good potential for designing ...

متن کامل

Joint Encryption and Watermarking Technique Using Block Cipher and Wavelet

This paper proposes a joint encryption and watermarking technique based on random block permutation and DWT with the motivation to enhance the security of the multimedia content. The original image is sectioned into the blocks and shuffle the blocks using random permutation, In this technique copyright information is concealed into an encrypted image. Based on the results, permutation of blocks...

متن کامل

Leakage resistant encryption and decryption

Introduction Data encryption and decryption operations are basic building blocks for most security applications. For this purpose, most systems use block ciphers, such as the public AES standard. It is well known, however, that implementations of block ciphers such as AES, as well as other cryptographic algorithms, are subject to side-channel attacks [1]. These attacks allow adversaries to extr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Journal of the Korean Institute of Information and Communication Engineering

سال: 2011

ISSN: 2234-4772

DOI: 10.6109/jkiice.2011.15.4.860