Key Words: AES Algorithm, Genetic Algorithms, Ciphering, Key Expansion.
|
|
- Erick Booth
- 6 years ago
- Views:
Transcription
1 Using Moifie Genetic Algorithm to Replace AES Key Expansion Algorithms Abullah Abali Rashe Saba university Research, Stuies an Training Center Sana, Yemen. Abstract The main criterion of the ciphering key is that it will be expane to scheule key in ciphering phase. In aition, the scheule key is use to encrypt the plain text block. However it is preferre to have an inverse that will be use to ecrypt the ciphere ata block. This paper presents a new simple approach to carry out the key expansion process; it first takes the cipher key an expans it to construct the scheule key. The propose approach is simple an fasts as it is base on Moifie Genetic Algorithm (MGA). Key Wors: AES Algorithm, Genetic Algorithms, Ciphering, Key Expansion. 1. Introuction Key scheule algorithm process is expaning short cipher key (128 bits) into large set of keys (1408 bits), calle roun keys (10). Scheule key is very important phase in ciphering algorithms, as a strong scheule key means a strong cipher that woul be more resistant to various forms of attacks, such as ifferential an linear cryptanalysis (5). Carter, Dawsony an Nielseny (5) classifie AES caniates accoring to key scheules as the authors thought that key expansion is very important as strong scheule key means stronger algorithm against both linear an ifferential cryptanalysis. They recommene that the scheule key of AES caniates shoul be upgrae. Genetic Algorithms (Gas) have playe a strong role in ata security systems, Yaseen et.al. (15) use genetic algorithm for the cryptanalysis, Spillman an et al. use GA to cryptanalysis a simple substitution (14), Mathews use GA in transposition ciphers (9) an Spillman use GA in knapsack base systems (13), Bagnall use GA to crack ifficult systems such as block cipher (Data Encryption Stanar DES) (3), Grunlingh et. al. use GA to attack mono-alphabetic substitution but their approach not seeme effective against transposition (8). Bagnall et al. use Genetic Algorithm as cryptanalysis of a three rotor machine using genetic algorithm an their results showe that an unknown three rotor machine can be cryptanalyse with about 4000 letters of ciphertext (4), Dimovski et al. (7) presente an automate attack on the polyalphabetic substitution cipher whereas Rashe (12) use Limite Genetic Algorithm (LGA) to generate a pool of cipher keys an scheule keys that will be use in ciphering an eciphering AES processes. However it was suggeste having a pool of AES keys an a scheule key woul be taken from this pool then the ciphere block an inex of the start location (1).
2 It is useful to avoi the normal key scheuling process, an specify the cipher keys (which shoul be ranom an inepenent) irectly (2). In this research the genetic algorithm process will be moifie to assist in the process of generating ciphering an scheuling keys. 2. Basic Iea of GAs (12) Genetic algorithms consist of three phases as following: (I) Reprouction Operation: The ol string is carrie through into a new population epening on the performance inex values. The fitness values are calculate for each caniate string using a fitness function, which epens on a goal for optimization problems. Accoring to the fitness values, string with larger fitness values give rise to a larger number of copies in the next generation. (II) Crossover operation: The strings are ranomly mate using the crossover operation. Each pair of caniate strings will unergo crossover with the probability cross. This operation provies ranomize information exchange among the strings. (III) Mutation operation: Mutation is simply an occasional ranom alteration of the value of a string position. In a binary coe, this involves changing a 1 to 0 an vice versa. The sequence of successive stages of genetic algorithms is shown in figure (1). OLD POPULATION NEW POPULATION Evaluation SELECTION MUTATION MATING Crossover Figure (1) sequence of genetic algorithm 3. Key Expansion in AES (6 an 11) The Expane Key is a linear array of cipher key (4-byte wors) an is enote by W[Nb*(Nr+1)]. The first Nk wors contain the Cipher Key. The key expansion function epens on the value of Nk: there are two versions of Nk as Nk may be equal to or below 6 (Nk4 or 6), or Nk above 6 (Nk8) for Nk 6, we have the following algorithm: Function keyexpansion(byte Key[4*Nk] wor W[Nb*(Nr+1)]) For i 0 to Nk step by 1 W[i] (Key[4*i],Key[4*i+1],Key[4*i+2],Key[4*i+3]) En for
3 For ink to Nb (Nr + 1) step by 1 temp W[i - 1]; if i mo Nk 0 temp subbytes(rotbytes(temp)) ^ rcon[i / Nk] W[i] W[i - Nk] ^ temp En if En for En keyexpansion subbytes(state) is a metho that substitutes each byte of applying the AES (Rijnael) S-box to the byte at the corresponing position in the input wor returns a 4-byte wor. The function rotbytes(w) returns a wor in which the bytes are a cyclic permutation of those in its input such that the input wor (a,b,c,) prouces the output wor (b,c,,a). The first Nk wors are fille with the cipher key. Every following wor W[i] is equal to the EXOR of the previous wor W[i-1] an the wor Nk positions earlier W[i-Nk]. For wors in positions that are a multiple of Nk, a transformation is applie to W[i-1] prior to the EXOR an a roun constant is EXORe. This transformation consists of a cyclic shift of the bytes in a wor (rotbyte), followe by the application of a table lookup to all four bytes of the wor (subbytes). For Nk > 6, we have: Function keyexpansion(byte Key[4*Nk] wor W[Nb*(Nr+1)]) For i 0 to Nk step by 1 W[i] (key[4*i],key[4*i+1],key[4*i+2],key[4*i+3]) En for For i Nk to Nb (Nr + 1) step by 1 temp W[i - 1] if i mo Nk 0 temp subbytes(rotbyte(temp)) ^ rcon[i / Nk] en if else if (i mo Nk 4) temp SubBytes(temp) en else if W[i] W[i - Nk] ^ temp En for En keyexpansion The roun constants are inepenent of Nk an efine by:
4 rcon[i] (RC[i], 00, 00, 00 ) with RC[i] representing an element in GF(2 8 ) with a value of x( i - 1) so that: RC[1] 1 (i.e. 01 ) RC[i] x (i.e. 02 ) (RC[i-1]) x(i-1) Roun Key Selection Roun key (i) is given by the roun key buffer wors W[Nb*i] to W[Nb*(i+1)] The cipher The cipher AES consists of An initial Roun Key aition; Nr-1 Rouns; A final roun. The algorithm is: Input: State, CipherKey Output: ciphereblock Function AES keyexpansion(cipherkey,expanekey) ; arounkey(state,expanekey); for i1 to Nr-1 step by 1 Roun(State,ExpaneKey + Nb*i) ; ciphereblock finalroun(state,expanekey + Nb*Nr); en for en AES The key expansion can be one on in avance an AES can be specifie in terms of the Expane Key. Input: State, ExpaneKey Output: ciphereblock Function AES arounkey(state,expanekey) for i1 to Nr-1 step by 1 roun(state,expanekey + Nb*i) ciphereblock finalroun(state,expanekey + Nb*Nr) en for en AES Note: There are no restrictions on the selection of the Cipher Key. Whereas expane key must be expane from cipher key.
5 4. Propose Algorithm To ate there has been no reporte research using GAs in any form or shape within a key expansion. The work introuce in this paper will show the use of the first moifie GAs in key expansion algorithm. The moifie GAs will only use some of the conventional GAs process; this will inclue ranom initialization of the first population of cipher keys, an then apply the process of ranom cross over an mutation to prouce further sets of cipher keys. In this research all cipher keys will be consiere acceptable an hence, there will be no nee to search for a best cipher key, since all keys will be use to cipher ata in this system. The propose algorithm in this case will only be use to generate cipher keys an it will not involve any search or optimization techniques. 4.1 Algorithm MGA Key Expansion Input: Nk Output: scheule key with length (Nr+1)Nb Initialization: generate a cipher key (Nk wors) in hexaecimal format. Generate Chil 1 an Chil 2 by Calling MGA algorithm (cipher key) Generate Chil 3 an Chil 4 by Calling MGA algorithm (Chil 1) Generate Chil 5 an Chil 6 by Calling MGA algorithm (Chil 2) Generate Chil 7 an Chil 8 by Calling MGA algorithm (Chil 3) Generate Chil 9 an Chil 10 by Calling MGA algorithm (Chil 4) If Nk 6 then Generate Chil 11 an Chil 12 by Calling MGA algorithm (Chil 5) En if If Nk 8 then Generate Chil 13 an Chil 14 by Calling MGA algorithm (Chil6) En if The crossover point woul be in the range [2...6] an shoul not be uplicate as the crossover point of the chil shoul be ifferent to the parents. En 4.2 Function MGA Input: cipher key with 16 bytes Output: two chilren consiere as roun keys Convert all elements of the cipher key into binary String Generate ranom crossover point using equation 1 Recombine iniviuals Mate iniviuals as follows: Generate two ranom points, r1 an r2 Key1 leftkey r2 with rightkey r1 Key2 rightkey r1 with leftkey r2 A the new population to the ol ones
6 En GACipherkey For the secon roun: The crossover point shoul not be the same as the previous roun as it might prouce the parent element again. To prevent repeating the parent value (at gran chil level), the algorithm have to follow up the following equation (1). If ol Crossover point new Crossover point then New crossover point i+i mo 5 equation (1) 5. Avantages of the Propose Scheme The use of moifie Genetic algorithm can introuce number of avantages to the whole process of crypto inustry. These avantages will inclue the following: This approach is very fast with comparison to all other conventional methos use to ate. In this approach only the cipher key an the crossover point for each roun will be sent to the receiver. 6. Illustrative Example Key Expansion Assuming that we have the cipher key 41 c c 41 c the scheule key shoul be as shown in figure 2 an figure 3. Parent ٧ c 6c c chil1 chil c c c6 54 c4 26 6c 4c chil 3 chil 4 chil 5 chil 6 24 c6 26 c6 c c6 c 6c 62 c4 c6 26 c c6 c c 4c 48 c6 c c6 c6 c c c c c chil 7 chil 8 chil 9 chil 10 c4 c4 c c c6 c4 c6 c c c
7 c6 c Figure 2: MGA for Nk4 7. Conclusion This paper showe how moifie genetic algorithms can be use to prouce a ciphering or scheule key. However the Moifie Genetic algorithm can be use to expan the cipher key to scheule key in any ciphering algorithm. The results obtaine using this metho has showe a highly secure an efficient algorithm an it ecrease the complexity of the original AES algorithm by more than 50%. As future work the algorithm can be enhance to have an inverse algorithm. References 1. Ajlouni N. A. El-Sheikh an A.Abali Rashe, New Approach in Key Generation an Expansion in Rijnael Algorithm, International Arab Journal of Information Technology, vol. 3, no. 1, January 2006, 2. Symmetric Ciphers, 3. Bagnall A., The Application of Genetic Algorithm Cryptanalysis, Mater Degree Thesis, 1996, School of Information Systems, University of East Anglia, 4. Bagnall A., McKeon G. an Raywar-Smith V., The Cryptanalysis of a Three Rotor Machine Using Genetic Algorithm, available at 5. Carter G., Dawsony E. an Nielseny L., Key Scheule Classification of the AES Caniates, Proceeings of Secon AES Caniate Conference (AES2), Rome, Italy, March Daemen J. an Rijmen V., AES Proposal: Rijnael, AES Algorithm Submission (version 2), September 3, 1999, available at AES page available via an at 7. Dimovski A., Gligoroski D., Attack On The Polyalphabetic Substitution Cipher Using A Parallel Genetic Algorithm, Technical report, Swiss- Maceonian scientific cooperation trought SCOPES project, March 2003, Ohri, Maceonia 8. Grunlingh W. an Vuuren J., Using Genetic Algorithm to Break a Simple Cryptographic Cipher, Available via 9. Mathews R., The use of Genetic Algorithm in Cryptanalysis, Cryptologia, Vol. 17 No. 4, Nakaraha J., Scheule key analysis of AES Caniates, July 1999, available at NIST 2001a. Feeral Information Processing Stanars Publication (FIPS PUB) 197. NIST, AES page available via Rashe A., Intelligent Encryption Decryption System Using Partial Genetic Algorithm an Rijnael Algorithm, Ph.D. Thesis, Arab Acaemy for Banking an Financial Sciences, Computer Information System Department, Spillman R., Cryptanalysis of Knapsack using Genetic Algorithms, Cryptologia, Volume 17 No. 1, ٧
8 14. Spillman R. et al, The Use a Genetic Algorithm in the Cryptanalysis of Simple Substitution Ciphers, Cryptologia, Vol. 17, No. 1, Yaseen I. an Sahasrabuhe H., A Genetic Algorithm for the Cryptanalysis of Chor-Rivest Knapsack Public Key Crypro System (PKC), Thir International Conference on Computational Intelligence an Multimeia Application, September 23-26, 1999, New Delhi, Inia.
9 Appenix All vectors are represente in hexaecimal format as a hexaecimal number can be represente as one byte as it consists of two igits (4 bits four one hexaecimal igit) These tests have been generate by RANA system; we use the same phrases that AES has been use. Date: Friay June 25 21:15:54 IDT 2004 Legen for cipher (roun number r 0 to 10, 12 or 14): Input: cipher input start: state at start of roun[r] s_box: state after SubBytes.subBytes(state) s_col: state after Shif.shiftCols(state) m_row: state after MixRow. mixrow (state) k_sch: key scheule value for roun[r] output: cipher output Cipher Example: 128-bit cipher key: Example Vectors Input String c b 68 Cipher Key 41 6c c 41 6c An scheule key is as following: parent chil1 chil 2 chil 3 ٧ 64 6c c6 46 c 6c c6 54 c4 26 6c 4c c 6c 62 c c 4c 48 chil 4 chil5 chil6 chil7 24 c6 26 c c6 c4 c6 26 c c6 c c6 c c6 c6 c Chil 8 Chil 9 Chil 10 c c c c c c c4 c4 c c c6 c4 c6 c c c6 c
10 Figure 2: scheule key generate by MGA
11 r[0].input r[0].k_sch r[0].input r[1].s_box r[1].s_row r[1].m_col r[1].start r[1].s_sch r[2].s_box r[2].s_row r[2].m_col r[2].start r[2].s_sch r[3].s_box r[3].s_row r[3].m_col r[3].start r[3].s_sch r[4].s_box r[4].s_row r[4].m_col r[4].start r[4].s_sch r[5].s_box r[5].s_row r[5].m_col r[5].start r[5].s_sch r[6].s_box r[6].s_row r[6].m_col r[6].start r[6].s_sch r[7].s_box r[7].s_row r[7].m_col r[7].start r[7].s_sch c b68 416c c416c f490c c f3a Roun 1 63c03bfe2c8efa53029c77cca7c c7802c2976fe307c3ba5cac0ef7c f21ab5a1ab1af0cc7a20ce b c5c75fbcae1e01e f c646c454c Roun 2 90bc35a6c6cf65e4727c8e26265a40 90cf8e0c67c4a6725a35e426bc6526 f2914ff061fff8aeb7752a0cc3aff b45709b647abeaba1b9f70f96ea6ce9 46c c6c Roun 3 85b014ea06287f4a e ea056504ea48701f4905b8776 1ef1babfb c2449b 94839bf6c ace05a c6c64656c4c Roun b9c142e b6b24f c126f7b b5e88b 32a173eb36c2e00ffa b f289b acf7b2703f c4c64656c6c Roun ff73b c0c c14914c343b7575f751176f37 c207b765f8c41896bb9a6b8c3f9c1e5 e e9b17af4ffb47e053f c454c c6c6c6c6c6 Roun 6 8ef8fc7b214f079e3168f36b75c526 8e14826b216c5c7e3758f796bff0f3 900cf15c470678bb4fa1836c eb192b6802e969e395aa51e0f c456c c6c6c6c6c Roun 7 b59f7a4f145771ef60b12be067276f b54512ff10b764f6727a1e069f77be 51f4c87246a971c f04ae85 13b081007e15a461e030503b68efe c4161 Figure 3: Ciphering Phase (continue)
12 Roun 8 r[8].s_box 7e75cac efe10453e245f69 r[8].s_row c5e1fcaef45549e2e75953 r[8].m_col 68b29b04bcacc4e51ecbcba0e78f4225 r[8].start 4cf6cf22a8e882c358eef6a r[8].s_sch c61416 Roun 9 r[9].s_box 29428a93c29b132e6a a3bb1c3 r[9].s_row 299b55c3c255b1936a3b8a2e0a r[9].m_col b72c5383f9a8cb r[9].start 50fc606ac4b70242f9710a0547b8e8 r[9].s_sch 22c c6c4c62656c Roun 10 r[10].s_box 53b00021ca9772c99a3676ba0b9195 r[10].s_box 53a96751ca b902ca0b0776b r[10].s_sch 416c c416c r[10].output 71e eb36e55b249ec92150f Figure 3: Ciphering Phase Cipher Example: 128-bit cipher key: roun number The following iagrams shows the hexaecimal values in the state array as the cipher progresses for a input block with length 16 bytes an a cipher key with 4 wors too. Input String c b 68 Cipher Key 41 6c c 41 6c start of roun after subbyte after shiftrows after mixrowss roun key values input c c 6c b c c 30 ca f2 ab 7a 47 c 30 ca 64 6c f 2 4c 01 c c c c0 a 1a f c7 76 3b ef b5 f0 ce 4b ef c7 76 6c 4c b 0c a fe a5 7c a1 cc fe a5 7c Figure 4: Ciphering Phase(continue) 2 c7 1e 23 c c f2 61 b 0 c6 46 ٧ f bc cf 7c 5a cf 7c 5a bc ff 7 cc c6 54 c bc e6 19 e 4 e f f8 75 3a c5 ae 23 f3 a6 e a6 e4 26 f0 ae 2a ff 3 b a0 a4 90 a0 a bf ab b9 ea ef b2 46 c2 ٧ b ٧ b ea f7 6c ٧ ٧ b6 ba 0f e9 e f4 76 1e e 4e f4 76 ba b c 6c 62 c 4c c1 53 6b c1 53 6b b 0f 52 f6 23 a a1 36 fa 79
13 c8 4a 26 e8 6 f7 6 f7 12 e8 ٧ c2 31 7b c4 c6 26 b 0 ce 3 b9 7 8b 66 b9 7 8b e e c6 c b ٧ ac 3f ٧ ٧ f 06 f7 5 ٧ b c2 f8 6b c3 b b 24 c6 26 c6 ٧ ٧ c b9 f9 ٧ ٧ c6 f 68 4c c 75 6f b7 41 a6 c1 c c6 f7 37 0c c 34 f7 37 b8 e c6 c6 6 e6 3e 4 05 e b2 e3 6b e b2 e3 6b b4 c9 ٧ ff 3f f ٧ f c 0 fa 72 b ٧ b4 07 f f0 8 c5 c5 8f f0 f c ٧ af 7e 23 c7 79 f3 26 c7 79 f3 c 8b 36 4 c c c c c c 7 2 2b 6 a5 b5 f1 f6 06 b5 f1 f6 06 f ٧ e 68 9e 1e f 45 0b f f4 a b b f a٧ ٧ a٧ 77 c ae e9 5a e be f f 4 1e be ٧ c c 8 ٧ c5 ef e2 ٧ ٧ b b0 e e0 68 e7 55 e ef f a4 50 e4 ca c5 ef e2 bc 1e e7 e1 45 e7 b2 ac cb 8f f 5 59 c4 cb 42 b ca e5 a0 25 c6 Figure 4: Ciphering Phase 9 c a8 58 a3 c2 6a 0a f6 e8 e b b b cf 82 e 56 a b1 c3 f6 33 c2 6a 0a ٧ 55 3b 42 b1 8a 13 e 42 c3 c3 93 2e b7 f9 c4 c a8 cb c6 c4 c6 c4 10 c4 f9 47 c 99 a0 c 99 a0 fc b7 71 b b0 a9 a3 b9 a9 a3 b9 b0 c a 8e ٧ a c 6b c 6b c c c c output ٧ ٧ 5 ec e5 eb 5 92 ٧ b2 15 e 49 0f
Replace AES Key Expansion Algorithm. By Modified Genetic Algorithm
Applied Mathematical Sciences, Vol. 7, 2013, no. 144, 7161-7171 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.38482 Replace AES Key Expansion Algorithm By Modified Genetic Algorithm
More informationFundamentals of Cryptography
Fundamentals of Cryptography Topics in Quantum-Safe Cryptography June 23, 2016 Part III Data Encryption Standard The Feistel network design m m 0 m 1 f k 1 1 m m 1 2 f k 2 2 DES uses a Feistel network
More informationStream Ciphers and Block Ciphers
Stream Ciphers and Block Ciphers Ruben Niederhagen September 18th, 2013 Introduction 2/22 Recall from last lecture: Public-key crypto: Pair of keys: public key for encryption, private key for decryption.
More informationStream Ciphers and Block Ciphers
Stream Ciphers and Block Ciphers 2MMC10 Cryptology Fall 2015 Ruben Niederhagen October 6th, 2015 Introduction 2/32 Recall: Public-key crypto: Pair of keys: public key for encryption, private key for decryption.
More informationCSCI 454/554 Computer and Network Security. Topic 3.1 Secret Key Cryptography Algorithms
CSCI 454/554 Computer and Network Security Topic 3.1 Secret Key Cryptography Algorithms Outline Introductory Remarks Feistel Cipher DES AES 2 Introduction Secret Keys or Secret Algorithms? Security by
More informationAIT 682: Network and Systems Security
AIT 682: Network and Systems Security Topic 3.1 Secret Key Cryptography Algorithms Instructor: Dr. Kun Sun Outline Introductory Remarks Feistel Cipher DES AES 2 Introduction Secret Keys or Secret Algorithms?
More informationSecret Key Systems (block encoding) Encrypting a small block of text (say 64 bits) General considerations for cipher design:
Secret Key Systems (block encoding) Encrypting a small block of text (say 64 bits) General considerations for cipher design: Secret Key Systems (block encoding) Encrypting a small block of text (say 64
More informationECE596C: Handout #7. Analysis of DES and the AES Standard. Electrical and Computer Engineering, University of Arizona, Loukas Lazos
ECE596C: Handout #7 Analysis of DES and the AES Standard Electrical and Computer Engineering, University of Arizona, Loukas Lazos Abstract. In this lecture we analyze the security properties of DES and
More informationCIS-331 Fall 2014 Exam 1 Name: Total of 109 Points Version 1
Version 1 1. (24 Points) Show the routing tables for routers A, B, C, and D. Make sure you account for traffic to the Internet. Router A Router B Router C Router D Network Next Hop Next Hop Next Hop Next
More informationThe Encryption Standards
The Encryption Standards Appendix F Version 1.0 Computer Security: Art and Science, 2 nd Edition Slide F-1 Outline Data Encryption Standard Algorithm Advanced Encryption Standard Background mathematics
More informationCryptography and Network Security. Sixth Edition by William Stallings
Cryptography and Network Security Sixth Edition by William Stallings Chapter 5 Advanced Encryption Standard Advance Encryption Standard Topics Origin of AES Basic AES Inside Algorithm Final Notes Origins
More informationInterior Permanent Magnet Synchronous Motor (IPMSM) Adaptive Genetic Parameter Estimation
Interior Permanent Magnet Synchronous Motor (IPMSM) Aaptive Genetic Parameter Estimation Java Rezaie, Mehi Gholami, Reza Firouzi, Tohi Alizaeh, Karim Salashoor Abstract - Interior permanent magnet synchronous
More informationOptimized AES Algorithm Using FeedBack Architecture Chintan Raval 1, Maitrey Patel 2, Bhargav Tarpara 3 1, 2,
Optimized AES Algorithm Using FeedBack Architecture Chintan Raval 1, Maitrey Patel 2, Bhargav Tarpara 3 1, 2, Pursuing M.Tech., VLSI, U.V.Patel college of Engineering and Technology, Kherva, Mehsana, India
More informationCryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 6: Advanced Encryption Standard (AES) Ion Petre Department of IT, Åbo Akademi University 1 Origin of AES 1999: NIST
More informationCHAPTER 2 LITERATURE SURVEY
27 CHAPTER 2 LITERATURE SURVEY 2.1 INTRODUCTION There have been many researches done on genetic algorithms and their application to various problems, there are relatively few papers that apply genetic
More informationA Specification for Rijndael, the AES Algorithm
A Specification for Rijndael, the AES Algorithm. Notation and Conventions. Rijndael Inputs and Outputs The input, output and cipher key for Rijndael are sequences containing 28, 6, 92, 224 or 256 bits
More informationFPGA Based Design of AES with Masked S-Box for Enhanced Security
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 3 Issue 5ǁ May 2014 ǁ PP.01-07 FPGA Based Design of AES with Masked S-Box for Enhanced Security
More informationContent of this part
UNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering Introduction to Cryptography ECE 597XX/697XX Part 4 The Advanced Encryption Standard (AES) Israel Koren ECE597/697 Koren Part.4.1
More informationENGI 8868/9877 Computer and Communications Security III. BLOCK CIPHERS. Symmetric Key Cryptography. insecure channel
(a) Introduction - recall symmetric key cipher: III. BLOCK CIPHERS k Symmetric Key Cryptography k x e k y yʹ d k xʹ insecure channel Symmetric Key Ciphers same key used for encryption and decryption two
More informationJournal of Cybernetics and Informatics. Slovak Society for Cybernetics and Informatics
Journal of Cybernetics an Informatics publishe by Slovak Society for Cybernetics an Informatics Volume 13, 1 http://www.sski.sk/casopis/inex.php (home page) ISSN: 1336-4774 Journal of Cybernetics an Informatics
More informationEnhanced Play Fair Cipher
P Enhanced Play Fair Cipher 1 1 Naveen KMP P, PDepartment of Information Technology, Velammal Engineering College, Chennai, Tamil Nadu, India. Abstract The theme of this research work is to design and
More informationAPPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly
International Journal "Information Technologies an Knowlege" Vol. / 2007 309 [Project MINERVAEUROPE] Project MINERVAEUROPE: Ministerial Network for Valorising Activities in igitalisation -
More informationNote on naming Rijndael. Note on naming
Joan Daemen Vincent Rimen Note on naming Rindael 1. Introduction Note on naming After the selection of Rindael as the AES it was decided to change the names of some of its component functions in order
More informationCIS-331 Exam 2 Fall 2015 Total of 105 Points Version 1
Version 1 1. (20 Points) Given the class A network address 117.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 4,000 subnets? b. (5 Points) What is
More informationCS 392/681 Computer Security. Module 1 Private Key Cryptography
CS 392/681 Computer Security Module 1 Private Key Cryptography Logistics Office hours Thursday 3 to 5 (tentative). Lab 0 due today. Lab 1 assigned. Due next Thursday!! ISIS is still unstable. Will fix
More informationCIS-331 Fall 2013 Exam 1 Name: Total of 120 Points Version 1
Version 1 1. (24 Points) Show the routing tables for routers A, B, C, and D. Make sure you account for traffic to the Internet. NOTE: Router E should only be used for Internet traffic. Router A Router
More informationAES Proposal: Rijndael
Authors: Joan Daemen Vincent Rimen AES Proposal: Rindael Joan Daemen Proton World Int.l Zweefvliegtuigstraat 10 B-1130 Brussel Belgium daemen.@protonworld.com Joan Daemen Vincent Rimen Vincent Rimen Katholieke
More informationImplementation of Full -Parallelism AES Encryption and Decryption
Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption
More informationInternational Journal of Informative & Futuristic Research ISSN:
Reviewed Paper Volume 3 Issue 3 November 2015 International Journal of Informative & Futuristic Research ISSN: 2347-1697 FPGA Implementation Of AES 128 Bit Algorithm For High Speed Altera Devices Paper
More informationLecture 5. Encryption Continued... Why not 2-DES?
Lecture 5 Encryption Continued... 1 Why not 2-DES? 2DES: C = DES ( K1, DES ( K2, P ) ) Seems to be hard to break by brute force, approx. 2 111 trials Assume Eve is trying to break 2DES and has a single
More informationAES Advanced Encryption Standard
AES Advanced Encryption Standard AES is iterated block cipher that supports block sizes of 128-bits and key sizes of 128, 192, and 256 bits. The AES finalist candidate algorithms were MARS, RC6, Rijndael,
More informationA Novel FPGA Implementation of AES-128 using Reduced Residue of Prime Numbers based S-Box
IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.9, September 2009 305 A Novel FPGA Implementation of AES-128 using Reduced Residue of Prime Numbers based S-Box Muhammad
More informationBlock Ciphers Introduction
Technicalities Block Models Block Ciphers Introduction Orr Dunkelman Computer Science Department University of Haifa, Israel March 10th, 2013 Orr Dunkelman Cryptanalysis of Block Ciphers Seminar Introduction
More information4. Specifications and Additional Information
4. Specifications and Additional Information AGX52004-1.0 8B/10B Code This section provides information about the data and control codes for Arria GX devices. Code Notation The 8B/10B data and control
More informationRandom Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation
DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,
More informationEFFICIENT HARDWARE IMPLEMENTATIONS FOR THE ADVANCED ENCRYPTION STANDARD (AES) ALGORITHM
EFFICIENT HARDWARE IMPLEMENTATIONS FOR THE ADVANCED ENCRYPTION STANDARD (AES) ALGORITHM by Issam Mahdi Hammad Submitted in partial fulfilment of the requirements for the degree of Master of Applied Science
More informationUsing Genetic Algorithm to Break Super-Pascal Knapsack Cipher
Cihan University, First International Scientific conference 204 Cihan University. All Rights Reserved. Research Article Using Genetic Algorithm to Break Super-Pascal Knapsack Cipher Safaa S Omran, Ali
More informationEvolutionary Optimisation Methods for Template Based Image Registration
Evolutionary Optimisation Methos for Template Base Image Registration Lukasz A Machowski, Tshilizi Marwala School of Electrical an Information Engineering University of Witwatersran, Johannesburg, South
More informationFrequent Pattern Mining. Frequent Item Set Mining. Overview. Frequent Item Set Mining: Motivation. Frequent Pattern Mining comprises
verview Frequent Pattern Mining comprises Frequent Pattern Mining hristian Borgelt School of omputer Science University of Konstanz Universitätsstraße, Konstanz, Germany christian.borgelt@uni-konstanz.e
More informationFAULT DETECTION IN THE ADVANCED ENCRYPTION STANDARD. G. Bertoni, L. Breveglieri, I. Koren and V. Piuri
FAULT DETECTION IN THE ADVANCED ENCRYPTION STANDARD G. Bertoni, L. Breveglieri, I. Koren and V. Piuri Abstract. The AES (Advanced Encryption Standard) is an emerging private-key cryptographic system. Performance
More informationCIS-331 Spring 2016 Exam 1 Name: Total of 109 Points Version 1
Version 1 Instructions Write your name on the exam paper. Write your name and version number on the top of the yellow paper. Answer Question 1 on the exam paper. Answer Questions 2-4 on the yellow paper.
More informationCryptographic Algorithms - AES
Areas for Discussion Cryptographic Algorithms - AES CNPA - Network Security Joseph Spring Department of Computer Science Advanced Encryption Standard 1 Motivation Contenders Finalists AES Design Feistel
More informationENHANCED AES ALGORITHM FOR STRONG ENCRYPTION
ENHANCED AES ALGORITHM FOR STRONG ENCRYPTION V. Sumathy & C. Navaneethan Assistant Professor, Department of CSE, Kingston Engineering College, Vellore, Tamil Nadu, India ABSTRACT In this paper we present
More informationCIS-331 Exam 2 Fall 2014 Total of 105 Points. Version 1
Version 1 1. (20 Points) Given the class A network address 119.0.0.0 will be divided into a maximum of 15,900 subnets. a. (5 Points) How many bits will be necessary to address the 15,900 subnets? b. (5
More informationOnline Appendix to: Generalizing Database Forensics
Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that
More informationL3: Basic Cryptography II. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806
L3: Basic Cryptography II Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806 8/29/2016 CSCI 451 -Fall 2016 1 Acknowledgement Many slides are from or
More information128 Bit ECB-AES Crypto Core Design using Rijndeal Algorithm for Secure Communication
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online): 2321-0613 128 Bit ECB-AES Crypto Core Design using Rijndeal Algorithm for Secure Communication
More informationLecture 4. Encryption Continued... Data Encryption Standard (DES)
Lecture 4 Encryption Continued... 1 Data Encryption Standard (DES) 64 bit input block 64 bit output block 16 rounds 64 (effective 56) bit key Key schedule computed at startup Aimed at bulk data >16 rounds
More informationFast Fractal Image Compression using PSO Based Optimization Techniques
Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting
More informationFrequency Domain Parameter Estimation of a Synchronous Generator Using Bi-objective Genetic Algorithms
Proceeings of the 7th WSEAS International Conference on Simulation, Moelling an Optimization, Beijing, China, September 15-17, 2007 429 Frequenc Domain Parameter Estimation of a Snchronous Generator Using
More informationCryptography Functions
Cryptography Functions Lecture 3 1/29/2013 References: Chapter 2-3 Network Security: Private Communication in a Public World, Kaufman, Perlman, Speciner Types of Cryptographic Functions Secret (Symmetric)
More informationAPNIC elearning: Cryptography Basics
APNIC elearning: Cryptography Basics 27 MAY 2015 03:00 PM AEST Brisbane (UTC+10) Issue Date: Revision: Introduction Presenter Sheryl Hermoso Training Officer sheryl@apnic.net Specialties: Network Security
More informationImplementation of the block cipher Rijndael using Altera FPGA
Regular paper Implementation of the block cipher Rijndael using Altera FPGA Piotr Mroczkowski Abstract A short description of the block cipher Rijndael is presented. Hardware implementation by means of
More informationBlock Ciphers. Lucifer, DES, RC5, AES. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk Block Ciphers 1
Block Ciphers Lucifer, DES, RC5, AES CS 470 Introduction to Applied Cryptography Ali Aydın Selçuk CS470, A.A.Selçuk Block Ciphers 1 ... Block Ciphers & S-P Networks Block Ciphers: Substitution ciphers
More informationA Specification for Rijndael, the AES Algorithm
A Specification for Rijndael, the AES Algorithm 1. Notation and Conventions 1.1 Rijndael Inputs and Outputs The input, output and cipher key for Rijndael are sequences containing 128, 160, 192, 224 or
More informationMessage Transport With The User Datagram Protocol
Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer
More informationIntensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2
This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar
More informationImplementation of the AES as a Hash Function for Confirming the Identity of Software on a Computer System
PNNL-1417 Implementation of the AES as a Hash Function for Confirming the Identity of Software on a Computer System R.R. Hansen R.. ass R.T. Kouzes N.D. Mileson January 23 Prepared for the U.S. Department
More informationSolution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation
Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University
More informationCS Network Security. Module 6 Private Key Cryptography
CS 393 - Network Security Module 6 Private ey Cryptography Data Encryption Encryption is the process of encoding a message such that its meaning is not obvious. Decryption is the reverse process, ie, transforming
More informationImage Segmentation using K-means clustering and Thresholding
Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,
More informationFPGA BASED CRYPTOGRAPHY FOR INTERNET SECURITY
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 10, October 2015,
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Instructor: Michael Fischer Lecture by Ewa Syta Lecture 7 September 23, 2015 CPSC 467, Lecture 7 1/1 Advanced Encryption Standard AES Alternatives CPSC 467,
More informationMidterm Exam. ECE 448 Spring Wednesday Section. (15 points)
Miterm Exam ECE 448 Spring 2 Wenesay Section (5 points) Instructions: Please rea this entire ocument carefully before beginning! Zip all your eliverables into an archive .zip an submit it through
More informationHow to Make E-cash with Non-Repudiation and Anonymity
How to Make E-cash with Non-Repuiation an Anonymity Ronggong Song an Larry Korba Institute for Information Technology National Research Council of Canaa Ottawa, Ontario K1A 0R6, Canaa {Ronggong.Song, Larry.Korba}@nrc.ca
More informationCIS-331 Exam 2 Spring 2016 Total of 110 Points Version 1
Version 1 1. (20 Points) Given the class A network address 121.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 8,100 subnets? b. (5 Points) What is
More informationIntroduction. Secret Key Cryptography. Outline. Secrets? (Cont d) Secret Keys or Secret Algorithms? Introductory Remarks Feistel Cipher DES AES
Outline CSCI 454/554 Computer and Network Security Introductory Remarks Feistel Cipher DES AES Topic 3.1 Secret Key Cryptography Algorithms 2 Secret Keys or Secret Algorithms? Introduction Security by
More informationParticle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base
More informationCPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Instructor: Michael Fischer Lecture by Ewa Syta Lecture 5a January 29, 2013 CPSC 467b, Lecture 5a 1/37 Advanced Encryption Standard AES Alternatives CPSC 467b,
More informationHardware Evaluation of the Stream Cipher-based Hash Functions RadioGatún and irrupt
Harare Evaluation of the Stream Cipher-base Hash Functions RaioGatún an irrupt L. Henzen, F. Carbognani, N. Felber, an W. Fichtner Integrate Systems Laboratory, ETH Zurich, Sitzerlan henzen@iis.ee.ethz.ch
More informationNon-homogeneous Generalization in Privacy Preserving Data Publishing
Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h
More informationUNIT - II Traditional Symmetric-Key Ciphers. Cryptography & Network Security - Behrouz A. Forouzan
UNIT - II Traditional Symmetric-Key Ciphers 1 Objectives To define the terms and the concepts of symmetric key ciphers To emphasize the two categories of traditional ciphers: substitution and transposition
More informationCPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Instructor: Michael Fischer Lecture by Ewa Syta Lecture 5 January 23, 2012 CPSC 467b, Lecture 5 1/35 Advanced Encryption Standard AES Alternatives CPSC 467b,
More informationTable-based division by small integer constants
Table-base ivision by small integer constants Florent e Dinechin, Laurent-Stéphane Diier LIP, Université e Lyon (ENS-Lyon/CNRS/INRIA/UCBL) 46, allée Italie, 69364 Lyon Ceex 07 Florent.e.Dinechin@ens-lyon.fr
More informationReconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Based on Complexity
Reconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Base on Complexity Xiangao Huang 1 Wei Huang 2 Xiaozhou Liu 3 Chao Wang 4 Zhu jing Wang 5 Tao Wang 1 1 College of Engineering, Shantou
More informationAlgorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times
Algorithm for Intermoal Optimal Multiestination Tour with Dynamic Travel Times Neema Nassir, Alireza Khani, Mark Hickman, an Hyunsoo Noh This paper presents an efficient algorithm that fins the intermoal
More informationEncryption and Decryption by AES algorithm using FPGA
Encryption and Decryption by AES algorithm using FPGA Sayali S. Kshirsagar Department of Electronics SPPU MITAOE, Alandi(D), Pune, India sayali.kshirsagar17@gmail.com Savita Pawar Department of Electronics
More informationBlock Ciphers. Secure Software Systems
1 Block Ciphers 2 Block Cipher Encryption function E C = E(k, P) Decryption function D P = D(k, C) Symmetric-key encryption Same key is used for both encryption and decryption Operates not bit-by-bit but
More informationSecret Key Cryptography
Secret Key Cryptography 1 Block Cipher Scheme Encrypt Plaintext block of length N Decrypt Secret key Cipher block of length N 2 Generic Block Encryption Convert a plaintext block into an encrypted block:
More informationWeek 5: Advanced Encryption Standard. Click
Week 5: Advanced Encryption Standard Click http://www.nist.gov/aes 1 History of AES Calendar 1997 : Call For AES Candidate Algorithms by NIST 128-bit Block cipher 128/192/256-bit keys Worldwide-royalty
More informationJuly Registration of a Cyrillic Character Set. Status of this Memo
Network Working Group Request for Comments: 1489 A. Chernov RELCOM Development Team July 1993 Status of this Memo Registration of a Cyrillic Character Set This memo provides information for the Internet
More informationDr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Secret Key Cryptography Block cipher DES 3DES
More informationVLSI Implementation of Advanced Encryption Standard for secured Electronic Voting Machine
www.ijraset.com VLSI Implementation of Advanced Encryption Standard for secured Electronic Voting Machine A. Jesu Silvancy 1, A. Jeyapaul Murugan 2 1 PG Scholar, 2 Assistant Professor, Dr. Sivanthi Aditanar
More informationLecture 2: Secret Key Cryptography
T-79.159 Cryptography and Data Security Lecture 2: Secret Key Cryptography Helger Lipmaa Helsinki University of Technology helger@tcs.hut.fi 1 Reminder: Communication Model Adversary Eve Cipher, Encryption
More informationDesign and Implementation of Rijndael Encryption Algorithm Based on FPGA
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 9, September 2013,
More informationA New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam
More informationNetwork Security Essentials
Network Security Essentials Applications and Standards Third Edition William Stallings Chapter 2 Symmetric Encryption and Message Confidentiality Dr. BHARGAVI H. GOSWAMI Department of Computer Science
More informationEfficient Hardware Design and Implementation of AES Cryptosystem
Efficient Hardware Design and Implementation of AES Cryptosystem PRAVIN B. GHEWARI 1 MRS. JAYMALA K. PATIL 1 AMIT B. CHOUGULE 2 1 Department of Electronics & Telecommunication 2 Department of Computer
More informationfiltering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember
107 IEICE TRANS INF & SYST, VOLE88 D, NO5 MAY 005 LETTER An Improve Neighbor Selection Algorithm in Collaborative Filtering Taek-Hun KIM a), Stuent Member an Sung-Bong YANG b), Nonmember SUMMARY Nowaays,
More informationHybrid Key Encryption using Cryptography for Wireless Sensor Networks V-Algorithm
ISSN : 0974 5572 International Science Press Volume 9 Number 40 2016 Hybrid Key Encryption using Cryptography for Wireless Sensor Networks V-Algorithm D. Anitha a S. Aruna a Mathew a K. Mathew a and Devilal
More informationCIS-331 Final Exam Spring 2015 Total of 115 Points. Version 1
Version 1 1. (25 Points) Given that a frame is formatted as follows: And given that a datagram is formatted as follows: And given that a TCP segment is formatted as follows: Assuming no options are present
More informationChapter 7 Advanced Encryption Standard (AES) 7.1
Chapter 7 Advanced Encryption Standard (AES) 7.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 7 Objectives To review a short history of AES To define
More informationDFA on AES. Christophe Giraud. Oberthur Card Systems, 25, rue Auguste Blanche, Puteaux, France.
DFA on AES Christophe Giraud Oberthur Card Systems, 25, rue Auguste Blanche, 92800 Puteaux, France. c.giraud@oberthurcs.com Abstract. In this paper we describe two different DFA attacks on the AES. The
More informationResearch Article A Student Information Management System Based on Fingerprint Identification and Data Security Transmission
Hindawi Electrical and Computer Engineering Volume 27, Article ID 9598581, 6 pages https://doi.org/10.1155/27/9598581 Research Article A Student Information Management System Based on Fingerprint Identification
More informationImplementation and Performance analysis of Skipjack & Rijndael Algorithms
Implementation and Performance analysis of Skipjack & Rijndael Algorithms By Viswanadham Sanku 1 Topics Skipjack cipher operations Design principles & cryptanalysis Implementation & optimization Results
More informationInvestigating Approaches of Data Integrity Preservation for Secure Data Aggregation in Wireless Sensor Networks
Journal of Information Security, 2014, 5, 1-11 Publishe Online January 2014 (http://www.scirp.org/ournal/is) http://x.oi.org/10.4236/is.2014.51001 Investigating Approaches of Data Integrity Preservation
More informationSymmetric Key Cryptography
Symmetric Key Cryptography Michael Huth M.Huth@doc.ic.ac.uk www.doc.ic.ac.uk/~mrh/430/ Symmetric Key Cryptography (3.1) Introduction Also known as SECRET KEY, SINGLE KEY, PRIVATE KEY Sender and Receiver
More informationA COMPARISON OF MEMETIC & TABU SEARCH FOR THE CRYPTANALYSIS OF SIMPLIFIED DATA ENCRYPTION STANDARD ALGORITHM
5-8 JATIT. All rights reserved. A COMPARISON OF MEMETIC & TABU SEARCH FOR THE CRYPTANALYSIS OF SIMPLIFIED DATA ENCRYPTION STANDARD ALGORITHM Poonam Garg Associate Prof., Department of Information Technology,
More informationSymmetric Key Encryption. Symmetric Key Encryption. Advanced Encryption Standard ( AES ) DES DES DES 08/01/2015. DES and 3-DES.
Symmetric Key Encryption Symmetric Key Encryption and 3- Tom Chothia Computer Security: Lecture 2 Padding Block cipher modes Advanced Encryption Standard ( AES ) AES is a state-of-the-art block cipher.
More informationOne subset of FEAL, called FEAL-NX, is N round FEAL using a 128-bit key without key parity.
FEAL-NX SPECIFICATIONS 1 Introduction 1.1 Outline of the FEAL-NX cipher FEAL, the Fast Data Encipherment Algorithm, is a 64-bit block cipher algorithm that enciphers 64-bit plaintexts into 64-bit ciphertexts
More information