نتایج جستجو برای: key block method

تعداد نتایج: 2235566  

1993
Joan Daemen Joos Vandewalle

The block ciphers PES and IPES were originally designed with the ambition to become the successor of DES as a standard. In this paper we point out why this would be a bad idea. On one hand a new block cipher (called MMB) is proposed, that uses similar primitive operations as (I)PES but can be more efficiently implemented both in hardware and in software. On the other hand classes of weak keys (...

2016
C. Bennila Thangammal D. Praveena P. Rangarajan

In the ancient block Hill cipher, the cipher text is obtained by multiplying the blocks of the plain text with the key matrix. To strengthen the keymatrix, a double guard Hill cipher was proposed with two key matrices, a private key matrix and its modified key matrix along with permutation. In the ancient block Hill cipher, the cipher text is obtained by multiplying the blocks of the plain text...

1995
Ronald L Rivest

This document describes the RC encryption algorithm a fast symmetric block cipher suitable for hardware or software imple mentations A novel feature of RC is the heavy use of data dependent rotations RC has a variable word size a variable number of rounds and a variable length secret key The encryption and decryption algorithms are exceptionally simple

Journal: :International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2019

Journal: :Journal of the Korea Institute of Information Security and Cryptology 2014

Journal: :Turkish Journal of Computer and Mathematics Education 2021

An information system is very important in today's changing world, and therefore choosing the proper becoming a decision. With time, systems have become more crucial, with multiple problems affecting supply chain continuous writing of performance areas. The principle management aims at values. working states that enhances value by establishing operational units. Traditional manufacturing chains...

Journal: :IACR Cryptology ePrint Archive 2018
Anubhab Baksi Shivam Bhasin Jakub Breier Mustafa Khairallah Thomas Peyrin

In this article, we propose a new method to protect block cipher implementations against Differential Fault Attacks (DFA). Our strategy, so-called “Tweak-in-Plaintext”, ensures that an uncontrolled value (‘tweak-in’) is inserted into some part of the block cipher plaintext, thus effectively rendering DFA much harder to perform. Our method is extremely simple yet presents many advantages when co...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید