Improved RC6 Algorithm Using Two Types of Chaos Maps
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Broad View of Cryptographic Hash Functions
IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 4, No 1, July 2013 ISSN (Print): 1694-0814 | ISSN (Online): 1694-0784 www.IJCSI.org 239 Broad View of Cryptographic Hash Functions 1 2 Mohammad A. AlAhmad , Imad Fakhri Alshaikhli 1 Department of Computer Science, International Islamic University of Malaysia, 53100 Jalan Gombak Kuala Lumpur, Malaysia, 2 Department of Computer Science, International Islamic University of Malaysia, 53100 Jalan Gombak Kuala Lumpur, Malaysia Abstract Cryptographic hash function is a function that takes an arbitrary length as an input and produces a fixed size of an output. The viability of using cryptographic hash function is to verify data integrity and sender identity or source of information. This paper provides a detailed overview of cryptographic hash functions. It includes the properties, classification, constructions, attacks, applications and an overview of a selected dedicated cryptographic hash functions. Keywords-cryptographic hash function, construction, attack, classification, SHA-1, SHA-2, SHA-3. Figure 1. Classification of cryptographic hash function 1. INTRODUCTION CRHF usually deals with longer length hash values. An A cryptographic hash function H is an algorithm that takes an unkeyed hash function is a function for a fixed positive integer n * arbitrary length of message as an input {0, 1} and produce a which has, as a minimum, the following two properties: n fixed length of an output called message digest {0, 1} 1) Compression: h maps an input x of arbitrary finite bit (sometimes called an imprint, digital fingerprint, hash code, hash length, to an output h(x) of fixed bit length n. -
Notices of the American Mathematical Society (ISSN 0002- Call for Nominations for AMS Exemplary Program Prize
American Mathematical Society Notable textbooks from the AMS Graduate and undergraduate level publications suitable fo r use as textbooks and supplementary course reading. A Companion to Analysis A Second First and First Second Course in Analysis T. W. Korner, University of Cambridge, • '"l!.li43#i.JitJij England Basic Set Theory "This is a remarkable book. It provides deep A. Shen, Independent University of and invaluable insight in to many parts of Moscow, Moscow, Russia, and analysis, presented by an accompli shed N. K. Vereshchagin, Moscow State analyst. Korner covers all of the important Lomonosov University, Moscow, R ussia aspects of an advanced calculus course along with a discussion of other interesting topics." " ... the book is perfectly tailored to general -Professor Paul Sally, University of Chicago relativity .. There is also a fair number of good exercises." Graduate Studies in Mathematics, Volume 62; 2004; 590 pages; Hardcover; ISBN 0-8218-3447-9; -Professor Roman Smirnov, Dalhousie University List US$79; All AJviS members US$63; Student Mathematical Library, Volume 17; 2002; Order code GSM/62 116 pages; Sofi:cover; ISBN 0-82 18-2731-6; Li st US$22; All AlviS members US$18; Order code STML/17 • lili!.JUM4-1"4'1 Set Theory and Metric Spaces • ij;#i.Jit-iii Irving Kaplansky, Mathematical Analysis Sciences R esearch Institute, Berkeley, CA Second Edition "Kaplansky has a well -deserved reputation Elliott H . Lleb M ichael Loss Elliott H. Lieb, Princeton University, for his expository talents. The selection of Princeton, NJ, and Michael Loss, Georgia topics is excellent." I nstitute of Technology, Atlanta, GA -Professor Lance Small, UC San Diego AMS Chelsea Publishing, 1972; "I liked the book very much. -
Attacks on and Advances in Secure Hash Algorithms
IAENG International Journal of Computer Science, 43:3, IJCS_43_3_08 ______________________________________________________________________________________ Attacks on and Advances in Secure Hash Algorithms Neha Kishore, Member IAENG, and Bhanu Kapoor service but is a collection of various services. These services Abstract— In today’s information-based society, encryption include: authentication, access control, data confidentiality, along with the techniques for authentication and integrity are non-repudiation, and data integrity[1]. A system has to key to the security of information. Cryptographic hashing ensure one or more of these depending upon the security algorithms, such as the Secure Hashing Algorithms (SHA), are an integral part of the solution to the information security requirements for a particular system. For example, in problem. This paper presents the state of art hashing addition to the encryption of the data, we may also need algorithms including the security challenges for these hashing authentication and data integrity checks for most of the algorithms. It also covers the latest research on parallel situations in the dynamic context [2]. The development of implementations of these cryptographic algorithms. We present cryptographic hashing algorithms, to ensure authentication an analysis of serial and parallel implementations of these and data integrity services as part of ensuring information algorithms, both in hardware and in software, including an analysis of the performance and the level of protection offered security, has been an active area of research. against attacks on the algorithms. For ensuring data integrity, SHA-1[1] and MD5[1] are the most common hashing algorithms being used in various Index Terms—Cryptographic Hash Function, Parallel types of applications. -
Algorithms, Key Size and Parameters Report – 2014
Algorithms, key size and parameters report – 2014 November, 2014 European Union Agency for Network and Information Security www.enisa.europa.eu Algorithms, key size and parameters report – 2014 November, 2014 About ENISA The European Union Agency for Network and Information Security (ENISA) is a centre of network and information security expertise for the EU, its member states, the private sector and Europe’s citizens. ENISA works with these groups to develop advice and recommendations on good practice in information security. It assists EU member states in implementing relevant EU legislation and works to improve the resilience of Europe’s critical information infrastructure and networks. ENISA seeks to enhance existing expertise in EU member states by supporting the development of cross-border communities committed to improving network and information security throughout the EU. More information about ENISA and its work can be found at www.enisa.europa.eu. Authors Contributors to this report: This work was commissioned by ENISA under contract ENISA D-COD-14-TO9 (under F-COD-13-C23) to the consortium formed by K.U.Leuven (BE) and University of Bristol (UK). Contributors: Nigel P. Smart (University of Bristol), Vincent Rijmen (KU Leuven), Benedikt Gierlichs (KU Leuven), Kenneth G. Paterson (Royal Holloway, University of London), Martijn Stam (University of Bristol), Bogdan Warinschi (University of Bristol), Gaven Watson (University of Bristol). Editor: Nigel P. Smart (University of Bristol). ENISA Project Manager: Rodica Tirtea. Agreements of Acknowledgements We would like to extend our gratitude to: External Reviewers: Michel Abdalla (ENS Paris), Kenneth G. Paterson (Royal Holloway, University of London), Ahmad-Reza Sadeghi (T.U. -
Optimized Hardware Implementation of RC6 Algorithm on FPGA for Cloud Security
International Journal of Ethics in Engineering & Management Education Website: www.ijeee.in (ISSN: 2348-4748, Volume 2, Issue 5, May 2015) Optimized hardware implementation of RC6 Algorithm on FPGA for Cloud Security Smitha Rose Varghese Nafeesath T P Dr.Jose Alex Mathew Electronics and communication Associate Prof. Director, ECE, PACE PACE, Mangalore, India Electronics and communication Mangalore, India. [email protected] PACE, Mangalore, India [email protected] [email protected] Abstract - RC6 is one of the finalists for AES. It is considered to performance, and a versatility of design that makes the cipher be in par with various other algorithms like Twofish, Rijndael, highly adaptable to future demands. It also says the three most etc.,. In this research work, investigation is done to implement important attributes of the final AES are security, secure data transfer of 192 bits using RC6 algorithm and on performance, and versatility. With RC6 we achieve all three improving the hardware performance of the RC6 algorithm by goals. RC6 is so simple that the full details of the cipher can identifying various operations that are present and those which can be optimized further. It is implemented on FPGA so as to get be recalled at will. Through simplicity we have developed a the hardware proof and also, its performance on FPGA is also truly versatile cipher. We have also developed a cipher that discussed. offers exceptional performance, and gives the best all-round suitability in Java with all the implications this holds for future applications. Most importantly, though, existing analysis on I. INTRODUCTION RC6 is not only by far the most extensive of any of the In cryptography, RC6 is a symmetric key block finalists, it is also the most accurate and the most detailed. -
Lecture 8B RTL Design Methodology Transition from the Pseudocode
Lecture 8B RTL Design Methodology Transition from the Pseudocode & Interface to a Corresponding Block Diagram Class Exercise 3 CIPHER RC6 RC6 (Rivest Cipher 6) - symmetric key block cipher Designers: Ron Rivest, Matt Robshaw, Ray Sidney, and Yiqun Lisa Yin One of five finalists of the contest for the Advanced Encryption Standard (AES) 1997-2000 Candidate algorithm in the following other contests: NESSIE – for European standards (2000-2003) CRYPTREC – for Japanese standards (2000-2003) 3 NIST Report: Security Security Margin High Serpent MARS Twofish Rijndael Adequate RC6 Simple Complex Complexity 4 Security: Theoretical attacks better than exhaustive key search Serpent 9 23 32 Twofish 6 10 16 Mars 11 5 16 without 16 mixing rounds Rijndael 7 3 10 RC6 15 5 20 0 5 10 15 20 25 30 35 # of rounds in the attack/total # of rounds NIST Report: Software Efficiency Encryption and Decryption Speed 32-bit 64-bit DSPs processors processors RC6 Rijndael Rijndael high Twofish Twofish Rijndael Mars Mars Mars medium Twofish RC6 RC6 low Serpent Serpent Serpent 6 Efficiency in hardware: FPGA Virtex 1000: Speed Throughput [Mbit/s] 500 431 444 George Mason University 450 414 University of Southern California 400 353 Worcester Polytechnic Institute 350 294 300 250 177 200 173 149 143 150 104 112 102 88 100 62 61 50 0 Serpent Rijndael Twofish Serpent RC6 Mars I8 I1 7 Pseudocode Split input I into four words, I3, I2, I1, I0, of the size of w bits each A = I3; B = I2; C = I1; D=I0 B = B + S[0] D = D + S[1] for i = 1 to r do { T = (B*(2B + 1)) <<< k U = (D*(2D + 1)) <<< k A = ((A ⊕ T) <<< U) + S[2i] C = ((C ⊕ U) <<< T) + S[2i + 1] (A, B, C, D) = (B, C, D, A) } A = A + S[2r + 2] C = C + S[2r + 3] O = (A, B, C, D) 8 Notation w: word size, e.g., w=32 (constant) k: log2(w) (constant) A, B, C, D, U, T: w-bit variables I3, I2, I1, I0: Four w-bit words of the input I r: number of rounds (constant) O: output of the size of 4w bits S[j] : 2r+4 round keys stored in two RAMs. -
Symmetric Algorithm Survey: a Comparative Analysis
International Journal of Computer Applications (0975 – 8887) Volume 61– No.20, January 2013 Symmetric Algorithm Survey: A Comparative Analysis Mansoor Ebrahim Shujaat Khan Umer Bin Khalid IQRA University IQRA University IQRA University Main Campus Main Campus Main Campus Defense View, Karachi Defense View, Karachi Defense View, Karachi ABSTRACT 1. INTRODUCTION Information Security has become an important issue in modern Cryptography a Modern encryption technology, comprising of world as the popularity and infiltration of internet commerce different mathematical processes involving the application of and communication technologies has emerged, making them a formulas (or algorithms) was conventionally designed to secure prospective medium to the security threats. To surmount these discretion of military and diplomatic communications. With the security threats modern data communications uses cryptography Rapid growth of information technology and science of an effective, efficient and essential component for secure encryption, an innovative area for cryptographic products has transmission of information by implementing security parameter stimulated. Cryptography [1] is defined as “the subdivision of counting Confidentiality, Authentication, accountability, and cryptology in which encryption /decryption algorithms are accuracy. To achieve data security different cryptographic designed, to guarantee the security and authentication of data”. algorithms (Symmetric & Asymmetric) are used that jumbles Cryptography can be classified as Symmetric -
Chapter 1 Introduction to Cryptography
introduction to cryptography chapter 1 introduction to cryptography 1.1 basic terminology Cryptography is the art of making and keeping messages secret. In practical terms, this involves the conversion of a plaintext message into a cryptic one, called cyphertext. The process of conversion, or encoding of the clear text is called encryption. The process of converting the cyphertext to the original content of the message, the plaintext, is called decryption. Both processes make use (in one way or another) of an encryption procedure, called encryption (decryption) algorithm. While most of these algorithms are public, the secrecy is guaranteed by the usage of an encryption (decryption) key, which is, in most cases, known only by the legitimate entities at the both ends of the communication channel. Cryptology is a branch of mathematics and describes the mathematical foundation of cryptographic methods, while cryptanalysis is the art of breaking ciphers. 1.2 cryptography Cryptography provides the following services: • authentication • integrity • non-repudiation • secrecy Let’s have a more detailed look at these services. Authentication allows the recipient of the message to validate the identity of the sender. It prevents an unauthorized entity to masquerade itself as a legitimate sender of the message. Integrity guarantees that the message sent has not been modified or altered along the communication channel. This is usually accomplished by attaching to the message itself a digest (compressed version) of fixed length of the message, digest which allows verify if the original message was (intentionally or not) altered. Non-repudiation with proof of origin assures the receiver of the identity of the sender, while non- repudiation with proof of delivery ensures the sender that the message was delivered. -
Status Report on the First Round of the SHA-3 Cryptographic Hash Algorithm Competition
NISTIR 7620 Status Report on the First Round of the SHA-3 Cryptographic Hash Algorithm Competition Andrew Regenscheid Ray Perlner Shu-jen Chang John Kelsey Mridul Nandi Souradyuti Paul NISTIR 7620 Status Report on the First Round of the SHA-3 Cryptographic Hash Algorithm Competition Andrew Regenscheid Ray Perlner Shu-jen Chang John Kelsey Mridul Nandi Souradyuti Paul Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 September 2009 U.S. Department of Commerce Gary Locke, Secretary National Institute of Standards and Technology Patrick D. Gallagher, Deputy Director NISTIR 7620: Status Report on the First Round of the SHA-3 Cryptographic Hash Algorithm Competition Abstract The National Institute of Standards and Technology is in the process of selecting a new cryptographic hash algorithm through a public competition. The new hash algorithm will be referred to as “SHA-3” and will complement the SHA-2 hash algorithms currently specified in FIPS 180-3, Secure Hash Standard. In October, 2008, 64 candidate algorithms were submitted to NIST for consideration. Among these, 51 met the minimum acceptance criteria and were accepted as First-Round Candidates on Dec. 10, 2008, marking the beginning of the First Round of the SHA-3 cryptographic hash algorithm competition. This report describes the evaluation criteria and selection process, based on public feedback and internal review of the first-round candidates, and summarizes the 14 candidate algorithms announced on July 24, 2009 for moving forward to the second round of the competition. The 14 Second-Round Candidates are BLAKE, BLUE MIDNIGHT WISH, CubeHash, ECHO, Fugue, Grøstl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein. -
10/21/20 1 Lecture 8B RTL Design Methodology Transition from The
10/21/20 Lecture 8B RTL Design Methodology Class Exercise 3 CIPHER Transition from the Pseudocode & Interface to a Corresponding Block Diagram 1 2 RC6 NIST Report: Security Security Margin RC6 (Rivest Cipher 6) - symmetric key block cipher Designers: Ron Rivest, Matt Robshaw, Ray Sidney, and Yiqun Lisa Yin MARS High Serpent Twofish One of five finalists of the contest for the Advanced Encryption Standard (AES) 1997-2000 Rijndael Adequate RC6 Candidate algorithm in the following other contests: NESSIE – for European standards (2000-2003) CRYPTREC – for Japanese standards (2000-2003) Simple Complex 3 Complexity 4 3 4 Security: Theoretical attacks better NIST Report: Software Efficiency than exhaustive key search Encryption and Decryption Speed Serpent 9 23 32 32-bit 64-bit DSPs processors processors Twofish 6 10 16 RC6 Rijndael Rijndael high Twofish Twofish Mars 11 5 16 without 16 mixing rounds Rijndael Mars Mars Mars RC6 RC6 Rijndael 7 3 10 medium Twofish RC6 15 5 20 low Serpent Serpent Serpent 0 5 10 15 20 25 30 35 # of rounds in the attack/total # of rounds 6 5 6 1 10/21/20 Efficiency in hardware: FPGA Virtex 1000: Speed Pseudocode Throughput [Mbit/s] Split input I into four words, I3, I2, I1, I0, of the size of w bits each 500 431 444 George Mason University A = I3; B = I2; C = I1; D=I0 450 414 University of Southern California B = B + S[0] 400 353 Worcester Polytechnic Institute D = D + S[1] 350 for i = 1 to r do 294 { 300 T = (B*(2B + 1)) <<< k 250 U = (D*(2D + 1)) <<< k A = ((A ⊕ T) <<< U) + S[2i] 177 200 173 C = ((C ⊕ U) <<< T) -
Comparative Analysis on Different Parameters of Encryption Algorithms for Information Security
International Journal of Innovations & Advancement in Computer Science IJIACS ISSN 2347 – 8616 Volume 4, Special Issue May 2015 Comparative Analysis on Different Parameters of Encryption Algorithms for Information Security Shailja Kumari,Jyoti Chawla Department Of Computer Science And Applications Chaudhary Devi Lal University,Sirsa ABSTRACT: If the confidentiality of the information is of very high value, it should be protected. If you want to stop the unauthorized disclosure or alteration of the information, secure it. Cryptography is an area of computer science which is developed to provide security for the senders and receivers to transmit and receive confidential data through an insecure channel by a means of process called Encryption/ Decryption. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper presents a comparative analysis on different parameters of encryption algorithms(AES,RC6,IDEA,BLOWFISH) such as Architecture, Flexibility, Reliability, Security and Limitation for information security that are essential for secure communication. General Terms: Algorithms, Encryption, Public Key, Private Key, Architecture, Flexibility, Overview, Limitations, Security. Index Terms—Cryptography, International Data Encryption Standard, Advance Encryption Standard, RC6 , Blowfish. 1. INTRODUCTION Cryptography is basically the process of hiding information. Our ATM cards, computer passwords and transferring data from one place to another are done with cryptography. Data cryptography mainly is the scrambling of the content of data, such as text, image, audio, video and so forth to make the data unreadable, invisible or unintelligible during transmission or storage called Encryption. -
Symmetric Key Cryptography: Current Trends
Preeti Singh et al, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.12, December- 2014, pg. 410-415 Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320–088X IJCSMC, Vol. 3, Issue. 12, December 2014, pg.410 – 415 RESEARCH ARTICLE Symmetric Key Cryptography: Current Trends Preeti Singh1, Praveen Shende2 ¹M. Tech. Scholar, CSE Department, Chhatrapati Shivaji Institute of Technology, Durg, India ²Asst. Professor, CSE Department, Chhatrapati Shivaji Institute of Technology, Durg, India 1 [email protected]; 2 [email protected] Abstract— The present day & age is the time when Information has become the most powerful commodity & communication online or through wireless networks has become an integral part of our lives. The data being transmitted is prone to various passive and active attacks. Thus, information security is in all likelihood the most formidable part of correspondence today. The solution to this problem is the use of cryptography techniques. Cryptography is the art and science of secret writing that changes the message from its typical structure into a garbled structure. The point of this paper is to portray an expansive review of Encryption & Decryption & provide an involved review of the various Symmetric Key Cryptography algorithms. Keywords— Cryptography, Encryption, Decryption, Survey, Symmetric Key I. INTRODUCTION Cryptography is the study of information hiding and retrieval. Cryptography is derived from the Greek words: kryptós, "hidden", and gráphein, "to write" - or "hidden writing". It is the art of protecting the information by transforming it into an unintelligible format in which a message can be hidden from reader and only the intended recipient will be able to convert it into original message.