Diffusive primitives in the design of modern cryptographic algorithms

被引:2
|
作者
Jamel, Sapiee Haji [1 ]
Deris, Mustafa Mat [1 ]
机构
[1] Univ Tun Hussein Onn Malaysia UTHM, Fac Informat Technol & Multimedia, Parit Raja 86400, Batu Pahat Joho, Malaysia
关键词
D O I
10.1109/ICCCE.2008.4580696
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The importance of data confidentiality, intergrity and availability in any data storage and transmission is undeniable especially with the development of highly integrated communication mediums such as the Internet. Disclosure of confidential or secret data to unauthorised users has become an important issue and indirectly give opportunity for ongoing research and development for reliable and strong cryptographic algorithms. Every modern cryptographic algorithm must have the elements of confusion and diffusion in it design. Research on finding effective and efficient diffusive element is still ongoing and highly discussed amongst researchers in the area of Information Security. In this paper, we investigate the diffusive property of three cryptographic algorithms: Rijndael, Twofish and Safer+ using a simple Test Vectors. Binary and decimal representation will be used to show the characteristic of each diffusive that play an important role as it will ensure any ciphertext generated from cryptographic algorithm are random and free from any predicted pattern which might be used by cryptanalyst to decipher the original message.
引用
收藏
页码:707 / 710
页数:4
相关论文
共 50 条
  • [31] The sponge construction as a source of secure cryptographic primitives
    Borowski, Mariusz
    2013 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MCC), 2013,
  • [32] Efficient Cryptographic Primitives for Private Data Mining
    Shaneck, Mark
    Kim, Yongdae
    43RD HAWAII INTERNATIONAL CONFERENCE ON SYSTEMS SCIENCES VOLS 1-5 (HICSS 2010), 2010, : 917 - +
  • [33] Encoding Cryptographic Primitives in a Calculus with Polyadic Synchronisation
    Joana Martinho
    António Ravara
    Journal of Automated Reasoning, 2011, 46 : 293 - 323
  • [34] New class of the FPGA efficient cryptographic primitives
    Moldovyan, NA
    Eremeev, MA
    Sklavos, N
    Koufopavlou, O
    2004 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL 2, PROCEEDINGS, 2004, : 553 - 556
  • [35] Design of cryptographic protocols by means of genetic algorithms techniques
    Zarza, Luis
    Pegueroles, Josep
    Soriano, Miguel
    Martinez, Rafael
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 316 - +
  • [36] New number-theoretic cryptographic primitives
    Brier, Eric
    Ferradi, Houda
    Joye, Marc
    Naccache, David
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2020, 14 (01) : 224 - 235
  • [37] The Black-Box Model for Cryptographic Primitives
    Claus Peter Schnorr
    Serge Vaudenay
    Journal of Cryptology, 1998, 11 : 125 - 140
  • [38] Random Organic Nanolaser Arrays for Cryptographic Primitives
    Feng, Jiangang
    Wen, Wen
    Wei, Xiao
    Jiang, Xiangyu
    Cao, Moyuan
    Wang, Xuedong
    Zhang, Xiqi
    Jiang, Lei
    Wu, Yuchen
    ADVANCED MATERIALS, 2019, 31 (36)
  • [39] Obfuscated Arbitrary Computation using Cryptographic Primitives
    Tsoutsos, Nektarios Georgios
    Maniatakos, Michail
    2015 10TH INTERNATIONAL DESIGN & TEST SYMPOSIUM (IDT), 2015, : 5 - 8
  • [40] ANALYSIS OF SOME CRYPTOGRAPHIC PRIMITIVES ON COMPUTER CLUSTERS
    Semenov, A. A.
    Zaikin, O. S.
    Bespalov, D., V
    Burov, P. S.
    Hmelnov, A. E.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2008, 2 (02): : 120 - 130