The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The S-Box is one of the major steps of the AdvancesEncryption Standard. Its entries are pre-computed and storedon read-only-memory lookup tables to avoid tedious real timecomputations using Galois Field. However, such setup is not ause-anytime any environment standard. On the one hand,storing entries of the S-Box may not be desirable for someenvironments. On the other hand, real time computing of...
CLEFIA is already shown to be vulnerable to differential fault analysis (DFA). The existing state-of-the-art DFA shows that two faults are enough to break CLEFIA-128, whereas for CLEFIA-192 and CLEFIA-256 ten faults are needed. Side-by-side it emphasizes the need for protecting last four rounds of the cipher in order to make it secure against the attack. In this paper we propose an improved DFA on...
The byte substitution table which is known as the S-Box is one of the major steps of the Advances Encryption Standard (AES). Its entries are pre-computed and stored on lookup tables (ROMs) to avoid tedious real time computations using Galois Field. However, in many situations, storing data weakens the overall security as it gives a hacker a chance to put a foot at the door. To harden against such...
Edon80 was submitted to the eSTREAM project as a hardware stream cipher, it was broke for the period of the key stream sequence to be short. In this paper, we give a stream cipher based on quasigroup with key stream sequence of arbitrary period length, and discuss the character of quasigroup with large period growth.
In this paper a new approach for image encryption and decryption using chaotic map and a non linear equation known as BB equation is described. Chaotic maps have been widely used in data encryption. Various chaos map based encryption and decryption algorithms are used but are found to be insecure. Hence a new method is implemented based on BB (Brahmagupta-Bhaskara) equation which is combined with...
Since its release in November 2001, the Advanced Encryption Standard (NIST FIPS-197) has been the subject of extensive cryptanalysis research. The importance of this research has intensified since AES was named, in 2003, by NSA as a Type-1 Suite B Encryption Algorithm (CNSSP-15). As such, AES is now authorized to protect classified and unclassified national security systems and information. This paper...
This paper presents a research to strengthen the using of embedded system memory, including: Flash memory, SRAM, DRAM etc. For increasing the reliability on data storage, we use the conventional fault-tolerant mechanisms-Mirror and CRC techniques to carry out the forward protection at first. Furthermore we use the encryption and Reed-Solomon code to improve the function at back end. This article designs...
This contribution presents a method for inversion of masked data in GF(2N) with arbitrary number of logical masks. Proposed method is suitable for software implementations in various information protection devices.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.