Search Results - "confusion and diffusion"

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Enhance the robustness of secure Rijndael key expansion function based on increment confusion and diffusion bits by Hussien, Hassan Mansour, Muda, Zaiton, Md. Yasin, Sharifah

    Published 2017
    “…Authors of AES accepted that the key expansion function of Rijndael is comparatively weak. Confusion and diffusion are two properties of the operation a secure cipher. …”
    Get full text
    Get full text
  2. 2

    Key Transformation Approach for Rijndael Security by Sulong, Mek Rahmah

    Published 2008
    “…This method improves the security of Rijndael Key Scheduling by increasing the bit confusion and diffusion of the Rijndael Subkey. The new method has shown positive results in terms of the bit confusion and diffusion of Subkey and it has increased bit confusion and diffusion compared to the Subkey of the original Rijndael Key Schedule.…”
    Get full text
    Get full text
  3. 3

    Key transformation approach for Rijndael security. by Muda, Zaiton, Mahmod, Ramlan, Sulong, Mek Rahmah

    Published 2010
    “…Thus, a new transformation method which is called Shiftrow is proposed into the 128-bit Rijndael Key Schedule based upon information principles (bit confusion and diffusion properties). The new method has shown positive results in terms of the bit confusion and diffusion of subkey and it has increased bit confusion and diffusion compared to the subkey of the original Rijndael key schedule.…”
    Get full text
    Get full text
  4. 4

    The vulnerability analysis and the security evaluation of block ciphers by Rezaeipour, Davood, Md. Said, Mohamad Rushdan

    Published 2010
    “…The attainment of these properties causes the strength of confusion and diffusion properties in block ciphers. In this paper, we describe the computational efficiency of these properties for doing of security evaluation on the different classes of block ciphers. …”
    Get full text
    Get full text
  5. 5

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…It can be applied in designing a new block cipher that fulfils Shanon’s confusion and diffusion properties. The structure of the components has a fixed block size which is 128 bits and a key size of 128 bits. …”
    Get full text
    Get full text
  6. 6

    Some statistical simulation results over the 128-bit block cipher CLEFIA by Rezaeipour, Davood, Md. Said, Mohamad Rushdan

    Published 2009
    “…The attainment of some properties such as completeness, strict avalanche criterion and randomness cause the invigoration of confusion and diffusion properties in block ciphers. In this paper, we evaluate CLEFIA by considering these three important properties. …”
    Get full text
    Get full text
  7. 7

    The new approach of Rijndael key schedule by Sulaiman, Salasiah, Muda, Zaiton, Juremi, Julia

    Published 2012
    “…The aim of this research is to produce a new key schedule algorithm, an enhancement from the Rijndael key scheduling, which follows the principle of secure cipher by Shannon, where the new key schedule must satisfy the bit confusion and diffusion properties for security purpose. After both keys from schedule algorithms (Rijndael and the proposed approach) have been analyzed, the results show that the proposed approach satisfies the requirement that set by Shannon in achieving both of the properties.…”
    Get full text
  8. 8

    Development of DNA-based dynamic key-dependent block cipher by Saeed, Auday H.

    Published 2015
    “…The thesis identifies the similarity elements, and highlights the essential computation elements, namely the DNA-strands, DNA-bases, Central dogma process that can be applied in symmetric block cipher that fulfills Shannon’s confusion and diffusion properties. The DNAB utilizes the DNA-based key-dependent components to enhance the security of cipher, and reduce the number of cipher-iterated rounds. …”
    Get full text
    Get full text
  9. 9

    SCDSP: a novel stream cipher with dynamic structure and parameters by Mohamed Eljadi, Fardous, Alyaseen, Imad Fakhri Taha

    Published 2015
    “…In the proposed cipher, the dynamic parameters are the number of registers, the length of registers, clocking system, initialization procedure, confusion and diffusion method, and output function. These parameters are specified using bits from the secret key. …”
    Get full text
    Get full text
  10. 10

    MOIM: a novel design of cryptographic hash function by Alahmad, Mohammad, Alshaikhli, Imad Fakhri Taha

    Published 2013
    “…As a consequence there is a very strong confusion and diffusion in MOIM. Also, we show that MOIM resists all the generic attacks and Joux attack in two defense security levels.…”
    Get full text
    Get full text
  11. 11

    An immune system-inspired byte permutation function to improve confusion performance of round transformation in symmetric encryption scheme. by Ariffin, Suriyani, Mahmod, Ramlan, Jaafar, Azmi, Rezal, Muhammad, Ariffin, Kamel

    Published 2012
    “…In data encryption, the security of the algorithm is measured based on Shannon’s confusion and diffusion properties. This paper will proposed the Levinthal’s paradox and protein structure essential computation elements on the basis of diversity property of immune systems that satisfy with confusion property of symmetric encryption scheme. …”
    Get full text
  12. 12

    Design and analysis of a new hash function gear by Alshaikhli, Imad Fakhri Taha, Alahmad, Mohammad

    Published 2014
    “…As a consequence there is a very strong confusion and diffusion in Gear.…”
    Get full text
    Get full text
    Get full text
  13. 13
  14. 14
  15. 15

    Chaos Based Cryptography An Alternative to Algebraic Cryptography by Kamel Ariffin, Muhammad Rezal

    Published 2008
    “…Their sensitivity to initial conditions and their spreading out of trajectories over the whole interval seems to be a model that satisfies the classic Shannon requirements of confusion and diffusion [1] From 1989 onwards, many different chaotic encryption systems have been proposed. …”
    Get full text
    Get full text
  16. 16

    Mathematical aspects of selected block ciphers by Alqarni, Yazeed Saeed

    Published 2015
    “…The main objective of this thesis is to analyse the mathematical primitives used in the design of many block ciphers and point out which primitives are essential and important in the fulfilment of confusion and diffusion properties. The findings of the thesis can be divided into the following main contributions: an overview of the different types of block ciphers primitives are given, the block ciphers are explored in terms of their underlying algebraic structure operations, and the algebraic primitives used in block ciphers design are evaluated from their security and efficiency aspects and then compared with random substitution boxes (S-boxes). …”
    Get full text
    Get full text
  17. 17

    A Class Of Measurable Dynamical Systems For Chaotic Cryptography by Akhshani, Afshin

    Published 2008
    “…The most important features of chaos are ergodicity and mixing, which can be connected with two basic cryptographic properties; confusion and diffusion. To prove ergodicity and strength of the mixing, it’s enough to show that the system possess an invariant measure and Kolmogorov-Sinai (K-S) entropy from dynamical systems point of view.…”
    Get full text
    Get full text
  18. 18

    Secure block cipher inspired by the human immune system by Ariffin, Suriyani

    Published 2012
    “…The thesis identifies the similarity elements and highlights the essential computation elements, namely the antigen-antibody interaction, somantic hypermutation model, Levinthal's paradox, and protein structure that can be applied in symmetric block cipher that fulfills Shannon's confusion and diffusion properties. The empirical findings presented the randomness of the output in the 3D-AES block cipher as compared to the AES block cipher, for the number of iteration rounds reduced by four, from seven to three. …”
    Get full text
    Get full text
  19. 19

    An enhanced color image encryption algorithm using LT-PRNG by Mohammed Ismael, Saba

    Published 2018
    “…There is no possibility of an attacker breaking the cipher, as the scheme showed perfect confusion and diffusion properties, and can withstand known/chosen plaintext attacks. …”
    Get full text
    Get full text
  20. 20

    Designing new chaotic and hyperchaotic systems for chaos-based cryptography by Kadhim, Al Karawi Hayder Natiq

    Published 2019
    “…In this algorithm, the essential requirements of confusion and diffusion are accomplished, and a stochastic sequence is used to enhance the security of encrypted image. …”
    Get full text
    Get full text