The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The F-function is the main part of the Camellia algorithm, used in encryption, decryption and key expansion. In this paper, the construction and properities of the F-function, especially the S-function in the F-function, are studied. A more detailed description of the S-function is given, which is more conducive to the understanding of the S-function look-up table. And the avalanche property of the...
Block ciphers' security mostly depends on S-box which is the only non-linear structure in most block ciphers. This paper studies and compares the avalanche property of the AES S-box and Camellia S-box, finally confirms that the AES S-box and Camellia S-box both satisfy the strict avalanche criterion basically.
The Camellia algorithm has four S boxes called as S1, S2, S3 and S4. Because the S1-box is the core of other S boxes, the avalanche property of S boxes can be studied through testing the avalanche property of S1-box. The test results show that the Camellia S-box basically meet the strict avalanche criterion.
The avalanche effect is an important performance that any block cipher must have. With the AES algorithm program and experiments, we fully test and research the avalanche effect performance of the AES algorithm, and give the changed cipher-bit numbers when respectively changing every bit of the plaintext and key in turn. The test results show that the AES algorithm has very good avalanche effect Performance...
Focusing on the feature of JPEG2000 data structure, this paper researched the encryption algorithms for JPEG2000 by analyzing JPEG2000 encoding and the existing image encryption, the encryption rule for JPEG2000 was found that we should make the compression unaffected or affected to a small degree, at the same time, the security can be improved. Through further research, the author has proposed a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.