A New Approach for Designing Cryptographic Systems based on Feistel Structure

نویسندگان

  • S. G. Srikantaswamy
  • Dr. H. D. Phaneendra
چکیده

Many Classical and modern cryptographic algorithms have been developed by the Cryptographers to facilitate data security operations. Classical ciphers are not being widely used because of limited key space. Public key cryptosystems are effective compare to symmetric systems but are slower than symmetric ciphers. Feistel Cipher structure is the reference structure for designing block-ciphers. In this paper we have proposed three variants to feistel structure to enhance the security of the data. The three constructive variants includes new design structure (The features of the derived structure includes 256 block length, processing of four parts of plaintext blocks, involvement of compression and padding operations), Generation of Round Key Using Random Number Generator approach and Use of unique round function for each round .Thus the existing Feistel structure has been modified to create a new block-cipher structure which incorporates effective key generation and round function approaches to provide effective data security.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method

Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...

متن کامل

A hierarchical approach for designing the downstream segment for a supply chain of petroleum production systems

Strategic decisions in a supply chain are the most important decisions for petroleum production systems. These decisions, due to high costs of transportation and storing, are costly and affected by the tactical and operational decisions in uncertain situations. In this article, we focus on designing a downstream segment for a supply chain of petroleum production systems. For this purpose, we wi...

متن کامل

Development of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals

Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...

متن کامل

Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives

Linear diffusion layer is an important part of lightweight block ciphers and hash functions. This paper presents an efficient class of lightweight 4x4 MDS matrices such that the implementation cost of them and their corresponding inverses are equal. The main target of the paper is hardware oriented cryptographic primitives and the implementation cost is measured in terms of the required number ...

متن کامل

Robust Distributed Source Coding with Arbitrary Number of Encoders and Practical Code Design Technique

The robustness property can be added to DSC system at the expense of reducing performance, i.e., increasing the sum-rate. The aim of designing robust DSC schemes is to trade off between system robustness and compression efficiency. In this paper, after deriving an inner bound on the rate–distortion region for the quadratic Gaussian MDC based RDSC system with two encoders, the structure of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013