Many attempts have been made to strengthen Feistel based block ciphers. Among the successful proposals is the key- dependent S-box which was implemented in some of the high-profile ciphers. In this paper a key-dependent permutation box is proposed and implemented on DES as a case study. The new modified DES, MDES, was tested against Diehard Tests, avalanche test, and performance test. The results showed that in general MDES is more resistible to attacks than DES with negligible overhead. Therefore, it is believed that the proposed key-dependent permutation should be considered as a valuable primitive that can help strengthen the security of Substitution-Permutation Network which is a core design in many Feistel based block ciphers
The data encryption standard (DES) is one of the most common symmetric encryption algorithms, but it...
Along with new cryptanalysis techniques, the security of block ciphers is always evolving. When desi...
Along with new cryptanalysis techniques, the security of block ciphers is always evolving. When desi...
Immunity against differential cryptanalysis is an important measure in designing symmetric ciphers. ...
International audienceIn this paper, we propose an efficient and secure variant of DES (S-DES), whic...
In this paper, we have developed a large block cipher by introducing the basic concepts of permutati...
International audienceThis book provides a survey on different kinds of Feistel ciphers, with their ...
The block cipher is an important means to provide data confidentiality in reality, and the S-box is ...
Abstract. In this paper we analyze and discuss the cryptographic robustness of key-dependent substit...
International audienceThis book provides a survey on different kinds of Feistel ciphers, with their ...
International audienceThis book provides a survey on different kinds of Feistel ciphers, with their ...
In this paper, we present a new framework for evaluating the performance characteristics of block ci...
The biggest challenge for symmetric cryptosystems is to replace their static substitution with dynam...
Abstract. Feistel ciphers are very common and very important in the design and analysis of blockciph...
Abstract. This paper shows that the actual proposal for an unbalanced Feistel network by Schneier an...
The data encryption standard (DES) is one of the most common symmetric encryption algorithms, but it...
Along with new cryptanalysis techniques, the security of block ciphers is always evolving. When desi...
Along with new cryptanalysis techniques, the security of block ciphers is always evolving. When desi...
Immunity against differential cryptanalysis is an important measure in designing symmetric ciphers. ...
International audienceIn this paper, we propose an efficient and secure variant of DES (S-DES), whic...
In this paper, we have developed a large block cipher by introducing the basic concepts of permutati...
International audienceThis book provides a survey on different kinds of Feistel ciphers, with their ...
The block cipher is an important means to provide data confidentiality in reality, and the S-box is ...
Abstract. In this paper we analyze and discuss the cryptographic robustness of key-dependent substit...
International audienceThis book provides a survey on different kinds of Feistel ciphers, with their ...
International audienceThis book provides a survey on different kinds of Feistel ciphers, with their ...
In this paper, we present a new framework for evaluating the performance characteristics of block ci...
The biggest challenge for symmetric cryptosystems is to replace their static substitution with dynam...
Abstract. Feistel ciphers are very common and very important in the design and analysis of blockciph...
Abstract. This paper shows that the actual proposal for an unbalanced Feistel network by Schneier an...
The data encryption standard (DES) is one of the most common symmetric encryption algorithms, but it...
Along with new cryptanalysis techniques, the security of block ciphers is always evolving. When desi...
Along with new cryptanalysis techniques, the security of block ciphers is always evolving. When desi...