期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
I-PRESENT<sup>TM</sup>: An Involutive Lightweight Block Cipher 被引量:2
1
作者 muhammad reza z’aba Norziana Jamil +2 位作者 Mohd Ezanee Rusli Md. zaini Jamaludin Ahmad Azlan Mohd Yasir 《Journal of Information Security》 2014年第3期114-122,共9页
This paper proposes a new involutive light-weight block cipher for resource-constraint environments called I-PRESENTTM. The design is based on the Present block cipher which is included in the ISO/IEC 29192 standard o... This paper proposes a new involutive light-weight block cipher for resource-constraint environments called I-PRESENTTM. The design is based on the Present block cipher which is included in the ISO/IEC 29192 standard on lightweight cryptography. The advantage of I-PRESENTTM is that the cipher is involutive such that the encryption circuit is identical to decryption. This is an advantage for environments which require the implementation of both circuits. The area requirement of I-PRESENTTM compares reasonably well with other similar ciphers such as PRINCE. 展开更多
关键词 Block CIPHER Lightweight CRYPTOGRAPHY PRESENT PRINCE CRYPTANALYSIS
下载PDF
Diffusion Analysis of Message Expansion in STITCH-256
2
作者 Norziana Jamil Ramlan Mahmod +2 位作者 muhammad reza z’aba Nur Izura Udzir zuriati Ahmad zukarnain 《Journal of Information Security》 2013年第3期129-137,共9页
Cryptographic hash functions are built up from individual components, namely pre-processing, step transformation, and final processing. Some of the hash functions, such as SHA-256 and STITCH-256, employ non-linear mes... Cryptographic hash functions are built up from individual components, namely pre-processing, step transformation, and final processing. Some of the hash functions, such as SHA-256 and STITCH-256, employ non-linear message expansion in their pre-processing stage. However, STITCH-256 was claimed to produce high diffusion in its message expansion. In a cryptographic algorithm, high diffusion is desirable as it helps prevent an attacker finding collision-producing differences, which would allow one to find collisions of the whole function without resorting to a brute force search. In this paper, we analyzed the diffusion property of message expansion of STITCH-256 by observing the effect of a single bit difference over the output bits, and compare the result with that of SHA-256. We repeated the same procedure in 3 experiments of different round. The results from the experiments showed that the minimal weight in the message expansion of STITCH-256 is very much lower than that in the message expansion of SHA-256, i.e. message expansion of STITCH-256 produce high diffusion. Significantly, we showed that the probability to construct differential characteristic in the message expansion of STITCH-256 is reduced. 展开更多
关键词 STITCH-256 MESSAGE EXPANSION DIFFUSION HASH FUNCTION
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部