Diffusive primitives in the design of modern cryptographic algorithms

被引:2
|
作者
Jamel, Sapiee Haji [1 ]
Deris, Mustafa Mat [1 ]
机构
[1] Univ Tun Hussein Onn Malaysia UTHM, Fac Informat Technol & Multimedia, Parit Raja 86400, Batu Pahat Joho, Malaysia
关键词
D O I
10.1109/ICCCE.2008.4580696
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The importance of data confidentiality, intergrity and availability in any data storage and transmission is undeniable especially with the development of highly integrated communication mediums such as the Internet. Disclosure of confidential or secret data to unauthorised users has become an important issue and indirectly give opportunity for ongoing research and development for reliable and strong cryptographic algorithms. Every modern cryptographic algorithm must have the elements of confusion and diffusion in it design. Research on finding effective and efficient diffusive element is still ongoing and highly discussed amongst researchers in the area of Information Security. In this paper, we investigate the diffusive property of three cryptographic algorithms: Rijndael, Twofish and Safer+ using a simple Test Vectors. Binary and decimal representation will be used to show the characteristic of each diffusive that play an important role as it will ensure any ciphertext generated from cryptographic algorithm are random and free from any predicted pattern which might be used by cryptanalyst to decipher the original message.
引用
收藏
页码:707 / 710
页数:4
相关论文
共 50 条
  • [1] On the Design of Cryptographic Primitives
    Pino Caballero-Gil
    Amparo Fúster-Sabater
    Acta Applicandae Mathematica, 2006, 93 : 279 - 297
  • [2] On the design of cryptographic primitives
    Caballero-Gil, Pino
    Fuster-Sabater, Amparo
    ACTA APPLICANDAE MATHEMATICAE, 2006, 93 (1-3) : 279 - 297
  • [3] Evaluation of cryptographic primitives on modern microcontroller platforms
    Stancu, Florin Alexandru
    Tranca, Cristian Dumitru
    Chiroiu, Mihai Daniel
    Rughinis, Razvan
    2018 17TH ROEDUNET IEEE INTERNATIONAL CONFERENCE: NETWORKING IN EDUCATION AND RESEARCH (ROEDUNET), 2018,
  • [4] Easing collision finding in cryptographic primitives with genetic algorithms
    Hernández, JC
    Isasi, P
    Ribagorda, A
    CEC'02: PROCEEDINGS OF THE 2002 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1 AND 2, 2002, : 535 - 539
  • [5] Cryptographic primitives
    Garrett, P
    PUBLIC-KEY CRYPTOGRAPHY, 2005, 62 : 1 - 62
  • [6] Design and Analysis of Reconfigurable Cryptographic Primitives: TRNG and PUF
    Vikash Kumar Rai
    Somanath Tripathy
    Jimson Mathew
    Journal of Hardware and Systems Security, 2021, 5 (3-4) : 247 - 259
  • [7] A Study of Cryptographic Backdoors in Cryptographic Primitives
    Easttom, Chuck
    26TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE 2018), 2018, : 1664 - 1669
  • [8] A EUROPEAN CALL FOR CRYPTOGRAPHIC ALGORITHMS - RIPE - RACE INTEGRITY PRIMITIVES EVALUATION
    VANDEWALLE, J
    CHAUM, D
    FUMY, W
    JANSEN, C
    LANDROCK, P
    ROELOFSEN, G
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 267 - 271
  • [9] Cryptographic primitives in blockchains
    Wang, Licheng
    Shen, Xiaoying
    Li, Jing
    Shao, Jun
    Yang, Yixian
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 127 : 43 - 58
  • [10] OpenCL HLS Based Design of FPGA Accelerators for Cryptographic Primitives
    Barenghi, Alessandro
    Madaschi, Michele
    Mainardi, Nicholas
    Pelosi, Gerardo
    PROCEEDINGS 2018 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS), 2018, : 634 - 641