TITLE

A COMPETITIVE ANALYSIS OF CRYPTOGRAPHY TECHNIQUES OVER BLOCK CIPHER

AUTHOR(S)
Hussain, Abid; Khan, Murtuza Ahmed
PUB. DATE
November 2012
SOURCE
Asian Journal of Computer Science & Information Technology;Nov2012, Vol. 2 Issue 11, p291
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
The complication of cryptography does not allow many people to actually understand the motivations of working security cryptography. Cryptography process seeks to distribute an estimation of basic cryptographic primitives across a number of unions in order to reduce security assumptions on individual nodes, which establish a level of fault-tolerance contrasting to the node modification. In an increasingly networked and distributed communications setting, there are more and more useful situations where the ability to distribute a computation between a number of dissimilar network intersections is needed. The reason back to the efficiency, fault-tolerance and security that order differently. Hence, this work aims to describe and review the different research that has done toward text encryption and description in the block cipher. Moreover, the proposed method suggests a cryptography model in the block cipher.
ACCESSION #
88033080

 

Related Articles

  • PES32-16 network consisting of sixteen round functions. Tuichiyev, G. // Ukrainian Scientific Journal of Information Security;2014, Vol. 20 Issue 1, p43 

    Using the cryptographic methods is one of most effective way to provide information confidentiality. From the viewpoint of modern computation technologies cryptographic algorithms developing and improving (such as block symmetric algorithms) are actual scientific problem. In this paper we...

  • Related-Key Differential Attacks on COSB-128. Tran, Song Dat Phuc; Lee, Changhoon // International Journal of Distributed Sensor Networks;9/27/2015, Vol. 2015, p1 

    COSB-128 (Moldovyan et al., 2002) is a block cipher with 128-bit and 256-bit secret keys, which use key and data-dependent operational substitutions in fast controllable permutation blocks (CPB) concept. It is designed with a simple key schedule to ensure a high speed of data transformation by...

  • PDPKDES ( Pre Distributed Powerful Key for Data Encryption Standard). Mittal, Prerna; Chauhan, Bhawna // International Journal on Computer Science & Engineering;Jun2013, Vol. 5 Issue 6, p553 

    Data encryption standard in spite of being a great algorithm in terms of a good combination of confusion and diffusion steps, doesn't largely used because of a weak key concept. The key used in DES is only 64 bits (or 56 bits) long. This paper introduces a concept of pre distributed powerful key...

  • Slender-Set Differential Cryptanalysis. Borghoff, Julia; Knudsen, Lars; Leander, Gregor; Thomsen, Søren // Journal of Cryptology;Winter2013, Vol. 26 Issue 1, p11 

    This paper considers PRESENT-like ciphers with key-dependent S-boxes. We focus on the setting where the same selection of S-boxes is used in every round. One particular variant with 16 rounds, proposed in 2009, is broken in practice in a chosen plaintext/chosen ciphertext scenario. Extrapolating...

  • A Novel Feistel Cipher Involving a Bunch of Keys Supplemented with XOR Operation. Sastry, V. U. K.; Kumar, K. Anup // International Journal of Advanced Computer Science & Application;Dec2012, Vol. 3 Issue 12, p92 

    In this investigation, we have developed a novel block cipher by modifying classical Feistel cipher. In this, we have used a key bunched wherein each key has a multiplicative inverse. The cryptanalysis carried out in this investigation clearly shows that this cipher cannot be broken by any attack.

  • How Biased Are Linear Biases. Baysal, Adnan; Kara, Orhun // International Journal of Information Security Science;Mar2012, Vol. 1 Issue 1, p20 

    In this paper we re-visit the Matsui's linear cryptanalysis. The linear attack on the full round DES was the first attack that has been verified experimentally. Matsui extended one-round linear approximations to a linear mask of plaintext-ciphertext pairs by means of his piling-up lemma. The...

  • A Block Cipher Using Rotation and Logical XOR Operations. Kumar, D. Sravan; Suneetha, C. H.; Chandrasekhar, A. // International Journal of Computer Science Issues (IJCSI);Nov2011, Vol. 8 Issue 6, p142 

    Cryptography is the study of methods of sending messages in disguised form so that only the intended recipients can remove the disguise and read the messages. Information security has become a very critical aspect of modern communication systems. With the global acceptance of the Internet as a...

  • Analysis of RC6 Symmetric Encryption Algorithm. Yawale, Rutuja R.; Rode, S. V. // International Journal of Advanced Research in Computer Science;Nov/Dec2011, Vol. 2 Issue 6, p297 

    Internet and networks applications are growing very fast, so the needs to protect such applications are increased. Cryptography refers to the science and art of transforming messages to make them secure and immune to attacks. Cryptography encryption algorithms play a main role in information...

  • ASC - A Stream Cipher with Built-In MAC Functionality. Wirt, Kai-Thorsten // International Journal of Computer Science;2007, Vol. 2 Issue 2, p131 

    In this paper we present the design of a new encryption scheme. The scheme we propose is a very flexible encryption and authentication primitive. We build this scheme on two relatively new design principles: t-functions and fast pseudo hadamard transforms. We recapitulate the theory behind these...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics