[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Xu et al., 2023 - Google Patents

A Strong Key Expansion Algorithm Based on Nondegenerate 2D Chaotic Map Over GF (2 n)

Xu et al., 2023

Document ID
17779879890174220471
Author
Xu D
Liu H
Publication year
Publication venue
International Journal of Bifurcation and Chaos

External Links

Snippet

The strength of a cryptosystem relies on the security of its key expansion algorithm, which is an important component of a block cipher. However, numerous block ciphers exhibit the vulnerability of reversibility and serialization. Therefore, it is necessary to design an …
Continue reading at www.worldscientific.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • G06F7/582Pseudo-random number generators
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • G06F7/588Random number generators, i.e. based on natural stochastic processes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • H04L9/0662Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/60Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
    • G06F7/72Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
    • G06F7/724Finite field arithmetic
    • G06F7/726Inversion; Reciprocal calculation; Division of elements of a finite field
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0637Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F2207/72Indexing scheme relating to groups G06F7/72 - G06F7/729
    • G06F2207/7219Countermeasures against side channel or fault attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use

Similar Documents

Publication Publication Date Title
Xu et al. A Strong Key Expansion Algorithm Based on Nondegenerate 2D Chaotic Map Over GF (2 n)
Qasaimeh et al. A novel simplified aes algorithm for lightweight real-time applications: Testing and discussion
Arnault et al. A new approach for FCSRs
Courtois et al. Combined algebraic and truncated differential cryptanalysis on reduced-round simon
Liu et al. Constructing strong S-Box by 2D chaotic map with application to irreversible parallel key expansion
Mandal et al. Feedback reconstruction and implementations of pseudorandom number generators from composited de Bruijn sequences
Alibadi et al. A proposed security evaluation method for Bluetooth E 0 based on fuzzy logic
Ghosh et al. A scalable method for constructing non-linear cellular automata with period 2 n− 1
Liu et al. The design of S-box based on combined chaotic map
Ali et al. 3D Lightweight Cryptosystem Design for IoT Applications Based on Composite S-Box
Hasija et al. A Performance Analysis of Root-Converging Methods for Developing Post Quantum Cryptography Algorithms to Mitigate Key-Size-Based Attacks
Kanso et al. Irregularly decimated chaotic map (s) for binary digits generations
Das et al. Generating cryptographically suitable non-linear maximum length cellular automata
Diedrich et al. Comparison of Lightweight Stream Ciphers: MICKEY 2.0, WG-8, Grain and Trivium
Mogos Quantum random number generator vs. random number generator
Mandal et al. Cryptographic D-morphic analysis and fast implementations of composited de Bruijn sequences
Das et al. Cryptographically Suitable Maximum Length Cellular Automata.
Younes et al. CeTrivium: A Stream Cipher Based on Cellular Automata for Securing Real-TimeMultimedia Transmission.
Karmakar et al. Leakage squeezing using cellular automata
Sosa-Gómez et al. Using Hadamard transform for cryptanalysis of pseudo-random generators in stream ciphers
Falih A Pseudorandom Binary Generator Based on Chaotic Linear Feedback Shift Register
John et al. Hash Function Design Based on Hybrid Five-Neighborhood Cellular Automata and Sponge Functions.
CN113886804B (en) Lightweight stream cipher generation method based on parallel cyclic shift register
Yerukala et al. LFL-A New Stream Cipher for Secure Communications
Zhao et al. A Lightweight block cipher based on quasigroups