Diffusive primitives in the design of modern cryptographic algorithms

被引:2
|
作者
Jamel, Sapiee Haji [1 ]
Deris, Mustafa Mat [1 ]
机构
[1] Univ Tun Hussein Onn Malaysia UTHM, Fac Informat Technol & Multimedia, Parit Raja 86400, Batu Pahat Joho, Malaysia
关键词
D O I
10.1109/ICCCE.2008.4580696
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The importance of data confidentiality, intergrity and availability in any data storage and transmission is undeniable especially with the development of highly integrated communication mediums such as the Internet. Disclosure of confidential or secret data to unauthorised users has become an important issue and indirectly give opportunity for ongoing research and development for reliable and strong cryptographic algorithms. Every modern cryptographic algorithm must have the elements of confusion and diffusion in it design. Research on finding effective and efficient diffusive element is still ongoing and highly discussed amongst researchers in the area of Information Security. In this paper, we investigate the diffusive property of three cryptographic algorithms: Rijndael, Twofish and Safer+ using a simple Test Vectors. Binary and decimal representation will be used to show the characteristic of each diffusive that play an important role as it will ensure any ciphertext generated from cryptographic algorithm are random and free from any predicted pattern which might be used by cryptanalyst to decipher the original message.
引用
收藏
页码:707 / 710
页数:4
相关论文
共 50 条
  • [21] New cryptographic primitives (plenary lecture)
    Knapskog, Svein Johan
    SEVENTH INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT APPLICATIONS, PROCEEDINGS, 2008, : 3 - 7
  • [22] Notions of reducibility between cryptographic primitives
    Reingold, O
    Trevisan, L
    Vadhan, S
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2004, 2951 : 1 - 20
  • [23] Recent developments in the design of conventional cryptographic algorithms
    Preneel, B
    Rijmen, V
    Bosselaers, A
    STATE OF THE ART IN APPLIED CRYPTOGRAPHY, 1998, 1528 : 105 - 130
  • [24] Cryptographic protocol design concept with genetic algorithms
    Park, K
    Hong, CL
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2005, 3682 : 483 - 489
  • [25] A Calculus for Concurrent Processes with Cryptographic Primitives
    Wang, Huanbao
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 3397 - 3400
  • [26] Security Amplification for Interactive Cryptographic Primitives
    Dodis, Yevgeniy
    Impagliazzo, Russell
    Jaiswal, Ragesh
    Kabanets, Valentine
    THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 128 - +
  • [27] DUALITY BETWEEN 2 CRYPTOGRAPHIC PRIMITIVES
    ZHENG, Y
    MATSUMOTO, T
    IMAI, H
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 508 : 379 - 390
  • [28] Energy-Efficient Cryptographic Primitives
    Miller, D. Michael
    Sasao, Tsutomu
    FACTA UNIVERSITATIS-SERIES ELECTRONICS AND ENERGETICS, 2018, 31 (02) : I - III
  • [29] A HARDWARE DESIGN-MODEL FOR CRYPTOGRAPHIC ALGORITHMS
    DAEMEN, J
    GOVAERTS, R
    VANDEWALLE, J
    LECTURE NOTES IN COMPUTER SCIENCE, 1992, 648 : 419 - 434
  • [30] Implementing Cryptographic Primitives in the Symbolic Model
    Laud, Peeter
    NASA FORMAL METHODS, 2011, 6617 : 267 - 281