This paper analyzes ways to improve the cryptographic strength of the symmetric block cipher RC5. The task to enhance the stability of the classic RC5 cipher is explained by the fact that it is part of various open cryptographic libraries and is frequently used in practice. Several methods have been considered, applying which theoretically contributes to improving the stability of cryptographic transformations. It is found that unlike other alternatives (increasing the number of rounds, the length of the key, and the encryption block), the use of nonlinear shift functions does not increase the computational complexity of the RC5 algorithm. The study result has helped build an analytical model that was implemented in the form of the MATLAB (...
The paper presents a new statistical bias in the distribution of the first two output bytes of the R...
Nowadays, the rapid evolution of communication systems offers, to a very large percentage of populat...
A new symmetric block cipher algorithm called AL02 has been developed. The algorithm scheme provides...
This paper analyzes ways to improve the cryptographic strength of the symmetric block cipher RC5. Th...
The RC5 algorithm is the cipher from the family of symmetric ciphers created by Ronald Rivest. Unlik...
In this paper we evaluate the resistance of the block cipher RC5 against linear cryptanalysis. We de...
In recent years, the need to develop encryption algorithms has led to an increase in the working and...
One of the main disadvantages of symmetric key algorithms in comparison with asymmetric key ones is ...
The development of modern cryptography is associated with the emergence of computing machines. Since...
One of the main disadvantages of symmetric key algorithms in comparison with asymmetric key ones is ...
Today, it is important that information is sentconfidentially over the network without fear ofhacker...
In this paper, we discuss the options for brute-force cracking of the RC5 block cipher, that is, for...
The main objective of this thesis is to examine the trade-offs between security and efficiency with...
Empirical thesis.Bibliography: pages 111-124.1. Introduction -- 2. Stream ciphers -- 3. Cryptanalysi...
Current era is digital and has elite advancement in technology, almost in every field things are bec...
The paper presents a new statistical bias in the distribution of the first two output bytes of the R...
Nowadays, the rapid evolution of communication systems offers, to a very large percentage of populat...
A new symmetric block cipher algorithm called AL02 has been developed. The algorithm scheme provides...
This paper analyzes ways to improve the cryptographic strength of the symmetric block cipher RC5. Th...
The RC5 algorithm is the cipher from the family of symmetric ciphers created by Ronald Rivest. Unlik...
In this paper we evaluate the resistance of the block cipher RC5 against linear cryptanalysis. We de...
In recent years, the need to develop encryption algorithms has led to an increase in the working and...
One of the main disadvantages of symmetric key algorithms in comparison with asymmetric key ones is ...
The development of modern cryptography is associated with the emergence of computing machines. Since...
One of the main disadvantages of symmetric key algorithms in comparison with asymmetric key ones is ...
Today, it is important that information is sentconfidentially over the network without fear ofhacker...
In this paper, we discuss the options for brute-force cracking of the RC5 block cipher, that is, for...
The main objective of this thesis is to examine the trade-offs between security and efficiency with...
Empirical thesis.Bibliography: pages 111-124.1. Introduction -- 2. Stream ciphers -- 3. Cryptanalysi...
Current era is digital and has elite advancement in technology, almost in every field things are bec...
The paper presents a new statistical bias in the distribution of the first two output bytes of the R...
Nowadays, the rapid evolution of communication systems offers, to a very large percentage of populat...
A new symmetric block cipher algorithm called AL02 has been developed. The algorithm scheme provides...