Some Informal Reflections on Rijndael and Twofish
نویسنده
چکیده
منابع مشابه
Performance Analysis of RC6, Twofish and Rijndael Block Cipher Algorithms
In this paper, Performance analysis of RC6, Twofish and Rijndael block cipher algorithms have been done on the basis of execution time and resource utilization. CPU utilization and memory utilization both are considered for determining resource utilization. These algorithms are parameterized algorithm and were designed to meet the requirements of the Advanced Encryption Standard (AES) competiti...
متن کاملProvably Secure Encryption Algorithm based on Feistel Structure
In 1997 The National Institute of Standards and Technology (NIST) started a process to select a symmetric-key encryption algorithm instead of DES. NIST determined the evaluation criteria that would be used to compare the candidate algorithms depending on the analyses and comments received, NIST selected five finalist algorithms (RC6, MARS, Rijndael, Serpent and Twofish). At the end, NIST select...
متن کاملPerformance Impact of Addressing Modes on Encryption Algorithms
Encryption algorithms commonly use table lookups to perform substitution, which is a confusion primitive. The use of table lookups in this way is especially common in the more recent encryption algorithms, such as the AES finalists like MARS and Twofish, and the AES winner, Rijndael. Workload characterization studies indicate that these algorithms spend a significant fraction of their execution...
متن کاملPerformance Evaluation of AES Finalists on the High-End Smart Card
This paper reports the performance of the AES finalists, MARS, RC6, Rijndael, Serpent, and Twofish, on the high-end smart card that has a Z80 core with Toshiba’s arithmetic coprocessor.
متن کاملPerformance of the AES Candidate Algorithms in Java
We analyze the five remaining AES candidate algorithms MARS, RC6, Rijndael, Serpent, and Twofish as well as DES, Triple DES, and IDEA by examining independently developed Java implementations. We give performance measurement results on several platforms, list the memory requirements, and present a subjective estimate for the implementation difficulty of the algorithms. Our results indicate that...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2000