Diffusive primitives in the design of modern cryptographic algorithms

被引:2
|
作者
Jamel, Sapiee Haji [1 ]
Deris, Mustafa Mat [1 ]
机构
[1] Univ Tun Hussein Onn Malaysia UTHM, Fac Informat Technol & Multimedia, Parit Raja 86400, Batu Pahat Joho, Malaysia
关键词
D O I
10.1109/ICCCE.2008.4580696
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The importance of data confidentiality, intergrity and availability in any data storage and transmission is undeniable especially with the development of highly integrated communication mediums such as the Internet. Disclosure of confidential or secret data to unauthorised users has become an important issue and indirectly give opportunity for ongoing research and development for reliable and strong cryptographic algorithms. Every modern cryptographic algorithm must have the elements of confusion and diffusion in it design. Research on finding effective and efficient diffusive element is still ongoing and highly discussed amongst researchers in the area of Information Security. In this paper, we investigate the diffusive property of three cryptographic algorithms: Rijndael, Twofish and Safer+ using a simple Test Vectors. Binary and decimal representation will be used to show the characteristic of each diffusive that play an important role as it will ensure any ciphertext generated from cryptographic algorithm are random and free from any predicted pattern which might be used by cryptanalyst to decipher the original message.
引用
收藏
页码:707 / 710
页数:4
相关论文
共 50 条
  • [41] Cryptographic primitives enforcing communication and storage complexity
    Golle, P
    Jarecki, S
    Mironov, I
    FINANCIAL CRYPTOGRAPHY, 2003, 2357 : 120 - 135
  • [42] A survey of metaheuristic algorithms for the design of cryptographic Boolean functions
    Djurasevic, Marko
    Jakobovic, Domagoj
    Mariot, Luca
    Picek, Stjepan
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2023, 15 (06): : 1171 - 1197
  • [43] Pseudo-free families and cryptographic primitives
    Anokhin, Mikhail
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2022, 16 (01) : 114 - 140
  • [44] Encoding Cryptographic Primitives in a Calculus with Polyadic Synchronisation
    Martinho, Joana
    Ravara, Antonio
    JOURNAL OF AUTOMATED REASONING, 2011, 46 (3-4) : 293 - 323
  • [45] The performance measurement of cryptographic primitives on Palm devices
    Wong, DS
    Fuentes, HH
    Chan, AH
    17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2001, : 92 - 101
  • [46] The black-box model for cryptographic primitives
    Schnorr, CP
    Vaudenay, S
    JOURNAL OF CRYPTOLOGY, 1998, 11 (02) : 125 - 140
  • [47] CryptoKnight: Generating and Modelling Compiled Cryptographic Primitives
    Hill, Gregory
    Bellekens, Xavier
    INFORMATION, 2018, 9 (09)
  • [48] Automated Identification of Cryptographic Primitives in Binary Programs
    Groebert, Felix
    Willems, Carsten
    Holz, Thorsten
    RECENT ADVANCES IN INTRUSION DETECTION, 2011, 6961 : 41 - +
  • [49] Cryptographic primitives based on compact knapsack problem
    Rizos, George S.
    Draziotis, Konstantinos A.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 83
  • [50] Watermarking Public-Key Cryptographic Primitives
    Goyal, Rishab
    Kim, Sam
    Manohar, Nathan
    Waters, Brent
    Wu, David J.
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III, 2019, 11694 : 367 - 398