Novel Data Encryption Algorithm

Total Page:16

File Type:pdf, Size:1020Kb

Novel Data Encryption Algorithm IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, No 2, July 2011 ISSN (Online): 1694-0814 www.IJCSI.org 561 Novel Data Encryption Algorithm Rajat Goel1, Ripu R Sinha2, O.P. Rishi3 1Central University of Rajasthan, Kishangarh, Rajasthan, India 2School of Computer and System Sciences, Jaipur national University Jaipur, Rajasthan, India-302025 3Central University of Rajasthan, Kishangarh, Rajasthan, India IDEA is an iterated block cipher algorithm based on Abstract the Fiestel network. It was designed by Xuejia Lai and James Massey in 1991. Feistel network or Fiestel We always strive to get better algorithms for securing cipher is a symmetric structure used in the construction of block ciphers. It was named after the data. A variety of such algorithms are being used in German cryptographer Horst Feistel. A Feistel cryptography. Manly block and stream ciphers are network is an iterated cipher with an internal function available and one of them is International Data called a r ound function. Iterated block ciphers are Encryption Algorithm (IDEA), which was regarded arguably as one of the best for encryption purposes. A constructed by repeatedly applying the round considerable time has elapsed since its advent and function. The number of rounds varies from algorithm to algorithm. The general setup of each this period has witnessed a wide development in round is almost the same. A key schedule is an process approaches and applications. The number of algorithm that, given the key, calculates the subkeys transactions and exchanges of data has increased for these rounds. A large number of block ciphers use exponentially. Consequently, better and novel attacks on data evolved. Researchers believe that the security the scheme, including the Data Encryption Standard of the algorithm needs to be improved keeping a (DES), IDEA etc. The advantage of Fiestel Cipher is that the operations of encryption and decryption are check on the time and space complexity. Within this very similar or even identical. This reduces the size of research work we are looking for a robust algorithm the code almost by half. The only change required is known as NDEA which can be applied for securing a reversal of the key schedule and inversion of their modern environment applications. values. Hence, the Feistel network model scores over substitution and transposition models as the round Keywords: Novel Data Encryption Algorithm function need not be invertible. A block cipher (NDEA), Data Encryption Standard (DES), encryption algorithm (E) takes plaintext M of a International Data Encryption Algorithm (IDEA), particular length and key K as an input, and outputs a Fiestel Structure corresponding ciphertext of the same length. The decryption algorithm (E−1) takes the cipher text as an input together with the key, and yields the original block of plaintext of the same length such that: 1. Introduction IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, No 2, July 2011 ISSN (Online): 1694-0814 www.IJCSI.org 562 Lucifer was the first block cipher developed at IBM in the 1970s. The Data Encryption Standard (DES) appeared in 1976. Fig. 2 The last half round of IDEA 1.1 IDEA 1.1.1 Algorithm • Key size : 128 bits • Plaintext Block size : 64 bits Bruce Schneier [4] provided a f ourteen-step • Rounds: 8.5 algorithm of IDEA. Here are the fourteen steps of a complete round (multiply means multiplication It provides high level security not based on keeping modulo 216 + 1, and add means addition modulo 216): the algorithm a secret, but by keeping the key secret which makes it suitable for use in a wide range of 1. Multiply X1 and the first subkey K1. applications worldwide. It can be economically 2. Add X2 and the second subkey K2. implemented in electronic components (VLSI Chip). 3. Add X3 and the third subkey K3. 4. Multiply X4 and the fourth subkey K4. 5. Bitwise XOR the results of steps 1 and 3. 6. Bitwise XOR the results of steps 2 and 4. 7. Multiply the result of step 5 and the fifth subkey K5. 8. Add the results of steps 6 and 7. 9. Multiply the result of step 8 and the sixth subkey K6. 10. Add the results of steps 7 and 9. 11. Bitwise XOR the results of steps 1 and 9. 12. Bitwise XOR the results of steps 3 and 9. 13. Bitwise XOR the results of steps 2 and 10. 14. Bitwise XOR the results of steps 4 and 10. For every round except the final transformation, a swap occurs, and the input to the next round is: result Fig. 1 First 8 rounds of IDEA of step 11 k result of step 13 k result of step 12 k result of step 14, which becomes X1 k X2 k X3 k X4, Plaintext is divided into four 16-bit sub-blocks: X1, the input for the next round. After round 8, a ninth X2, X3 and X4 (see fig. 1) and identical operations “half round” final transformation occurs: are performed on the four parts in 8 rounds. The 128- bit key is split into eight 16-bit blocks, which become After the eighth round, there is a final output eight subkeys. The first six subkeys are used in round transformation: one, and the remaining two subkeys are used in round two, similarly each round uses six 16-bit sub-keys for (1) Multiply X and the first subkey. 8 rounds while the last half-round uses four, i.e. a 1 (2) Add X and the second subkey. total of 52 keys. First 6 keys are extracted directly 2 (3) Add X and the third subkey. from the main key. Further groups of keys are created 3 (4) Multiply X and the fourth subkey. by rotating the main key left by 25 bits. 4 Finally, the four sub-blocks are reattached to produce The mathematical operations involved in each of the the ciphertext. rounds are: 1.1.2 Decryption Bitwise Exclusive OR (denoted by ). Addition modulo 216 (denoted by ). Decryption algorithm is exactly the same. The Multiplication modulo 216+1 (denoted⊕ by ). ⊞ subkeys are reversed and slightly different. The decryption subkeys are either the additive or ⊙ After the eight rounds there is a half round (as multiplicative inverses of the encryption subkeys. illustrated in fig. 2): Table 1 shows the encryption subkeys and the corresponding decryption subkeys. IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, No 2, July 2011 ISSN (Online): 1694-0814 www.IJCSI.org 563 Table 1: IDEA Encryption and Decryption Subkeys After an analysis of IDEA, some viable and feasible changes were made into it and so in this way NDEA Round Encryption Subkeys Decryption Subkeys came into being. (1) (1) (1) (9) - 1 (9) (9) K1 K2 K3 K1 –K2 –K3 2.1 Random Number and the Ordering of the 1st (1) (1) (1) (9) - 1 (8) (8) K4 K5 K6 K4 K5 K6 subkeys: (2) (2) (2) (8) - 1 (8) (8) K1 K2 K3 K1 –K3 –K2 2nd (2) (2) (2) (8) - 1 (7) (7) K4 K5 K6 K4 K5 K6 A random number is generated. The number of keys (3) (3) (3) (7) - 1 (7) (7) required in IDEA is 52, so it is ensured that random K1 K2 K3 K1 –K3 –K2 3rd (3) (3) (3) (7) - 1 (6) (6) K4 K5 K6 K4 K5 K6 number is in the range 1 to 52. The subkey of that (4) (4) (4) (6) - 1 (6) (6) number becomes the first subkey. System date-time K1 K2 K3 K1 –K3 –K2 4th (4) (4) (4) (6) - 1 (5) (5) may also be used to generate the random number as it K4 K5 K6 K4 K5 K6 will always be unique. It acts as a seed for the random (5) (5) (5) (5) - 1 (5) (5) K1 K2 K3 K1 –K3 –K2 function. In the original IDEA, as previously 5th (5) (5) (5) (5) - 1 5(4) (4) K4 K5 K6 K4 K5 K6 mentioned, the key schedule is static but it becomes (6) (6) (6) (4) - 1 (4) (4) dynamic in the NDEA. Hence, the security increases. K1 K2 K3 K1 –K3 –K2 6th (6) (6) (6) (4) - 1 (3) (3) The NDEA Encryption algorithm requires three K4 K5 K6 K4 K5 K6 inputs – Plaintext, Key and a r andom number as (7) (7) (7) (3) - 1 (3) (3) K1 K2 K3 K1 –K3 –K2 7th (7) (7) (7) (3) - 1 (2) (2) against only two in the Original IDEA. So even if an K4 K5 K6 K4 K5 K6 eavesdropper is able to lay his hands on the ciphertext (8) (8) (8) (2) - 1 (2) (2) K1 K2 K3 K1 –K3 –K2 and the key, he cannot obtain the plaintext. To make 8th (8) (8) (8) (2) - 1 (1) (1) K4 K5 K6 K4 K5 K6 it secure further, the random number can be encoded th 8.5 (9) (9) (1) - 1 (1) by a different encryption algorithm say RSA. This K1 K2 K1 –K2 (9) (9) (1) (1) - 1 will add the complexity of the RSA with that of the K3 K4 –K3 K4 IDEA and thus, make cryptanalysis attack even more difficult. S o at the receiving end, the decryption (1) th st Here, K4 denotes the 4 key of the 1 round process requires the following additional steps: The (1) - 1 (1) K4 denotes the multiplicative inverse of K4 key has to be first reshuffled back to the original form (1) (1) –K2 denotes the additive inverse of K2 using the random number and then fed into the decryption algorithm.
Recommended publications
  • Related-Key Cryptanalysis of 3-WAY, Biham-DES,CAST, DES-X, Newdes, RC2, and TEA
    Related-Key Cryptanalysis of 3-WAY, Biham-DES,CAST, DES-X, NewDES, RC2, and TEA John Kelsey Bruce Schneier David Wagner Counterpane Systems U.C. Berkeley kelsey,schneier @counterpane.com [email protected] f g Abstract. We present new related-key attacks on the block ciphers 3- WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. Differen- tial related-key attacks allow both keys and plaintexts to be chosen with specific differences [KSW96]. Our attacks build on the original work, showing how to adapt the general attack to deal with the difficulties of the individual algorithms. We also give specific design principles to protect against these attacks. 1 Introduction Related-key cryptanalysis assumes that the attacker learns the encryption of certain plaintexts not only under the original (unknown) key K, but also under some derived keys K0 = f(K). In a chosen-related-key attack, the attacker specifies how the key is to be changed; known-related-key attacks are those where the key difference is known, but cannot be chosen by the attacker. We emphasize that the attacker knows or chooses the relationship between keys, not the actual key values. These techniques have been developed in [Knu93b, Bih94, KSW96]. Related-key cryptanalysis is a practical attack on key-exchange protocols that do not guarantee key-integrity|an attacker may be able to flip bits in the key without knowing the key|and key-update protocols that update keys using a known function: e.g., K, K + 1, K + 2, etc. Related-key attacks were also used against rotor machines: operators sometimes set rotors incorrectly.
    [Show full text]
  • Cryptanalysis of a Reduced Version of the Block Cipher E2
    Cryptanalysis of a Reduced Version of the Block Cipher E2 Mitsuru Matsui and Toshio Tokita Information Technology R&D Center Mitsubishi Electric Corporation 5-1-1, Ofuna, Kamakura, Kanagawa, 247, Japan [email protected], [email protected] Abstract. This paper deals with truncated differential cryptanalysis of the 128-bit block cipher E2, which is an AES candidate designed and submitted by NTT. Our analysis is based on byte characteristics, where a difference of two bytes is simply encoded into one bit information “0” (the same) or “1” (not the same). Since E2 is a strongly byte-oriented algorithm, this bytewise treatment of characteristics greatly simplifies a description of its probabilistic behavior and noticeably enables us an analysis independent of the structure of its (unique) lookup table. As a result, we show a non-trivial seven round byte characteristic, which leads to a possible attack of E2 reduced to eight rounds without IT and FT by a chosen plaintext scenario. We also show that by a minor modification of the byte order of output of the round function — which does not reduce the complexity of the algorithm nor violates its design criteria at all —, a non-trivial nine round byte characteristic can be established, which results in a possible attack of the modified E2 reduced to ten rounds without IT and FT, and reduced to nine rounds with IT and FT. Our analysis does not have a serious impact on the full E2, since it has twelve rounds with IT and FT; however, our results show that the security level of the modified version against differential cryptanalysis is lower than the designers’ estimation.
    [Show full text]
  • A Proposed SAFER Plus Security Algorithm Using Fast Walsh Hadamard Transform for Bluetooth Technology D.Sharmila 1, R.Neelaveni 2
    International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 2, November 2009 A Proposed SAFER Plus Security algorithm using Fast Walsh Hadamard transform for Bluetooth Technology D.Sharmila 1, R.Neelaveni 2 1(Research Scholar), Associate Professor, Bannari Amman Institute of Technology, Sathyamangalam. Tamil Nadu-638401. [email protected] 2 Asst.Prof. PSG College of Technology, Coimbatore.Tamil Nadu -638401. [email protected] ABSTRACT realtime two-way voice transfer providing data rates up to 3 Mb/s. It operates at 2.4 GHz frequency in the free ISM-band (Industrial, Scientific, and Medical) using frequency hopping In this paper, a modified SAFER plus algorithm is [18]. Bluetooth can be used to connect almost any kind of presented. Additionally, a comparison with various device to another device. Typical range of Bluetooth communication varies from 10 to 100 meters indoors. security algorithms like pipelined AES, Triple DES, Bluetooth technology and associated devices are susceptible Elliptic curve Diffie Hellman and the existing SAFER plus to general wireless networking threats, such as denial of service attacks, eavesdropping, man-in-the-middle attacks, are done. Performance of the algorithms is evaluated message modification, and resource misappropriation. They based on the data throughput, frequency and security are also threatened by more specific Bluetooth-related attacks that target known vulnerabilities in Bluetooth level. The results show that the modified SAFER plus implementations and specifications. Attacks against algorithm has enhanced security compared to the existing improperly secured Bluetooth implementations can provide attackers with unauthorized access to sensitive information algorithms. and unauthorized usage of Bluetooth devices and other Key words : Secure And Fast Encryption Routine, Triple Data systems or networks to which the devices are connected.
    [Show full text]
  • Safer Than You Think! Revising the Transit Safety Narrative 1 September 2021
    www.vtpi.org [email protected] 250-508-5150 Safer Than You Think! Revising the Transit Safety Narrative 1 September 2021 Todd Litman Victoria Transport Policy Institute Abstract Public transportation is overall a relatively safe (low crash risk) and secure (low crime risk) mode of transport. Transit travel has about a tenth the traffic casualty (death or injury) rate as automobile travel, and transit-oriented neighborhood residents have about a fifth the per capita crash casualty rate as in automobile-oriented areas. Transit also tends to have lower overall crime rates than automobile travel, and many transit service improvements can further increase security by improving surveillance and economic opportunities for at-risk populations. Despite its relative safety and security, many people consider public transit dangerous, and so are reluctant to use it or support service expansions in their communities. Various factors contribute to this excessive fear, including the nature of public transit travel, heavy media coverage of transit- related crashes and crimes, and conventional traffic safety messages which emphasize danger rather than safety. Transit agencies can help create a new safety narrative by better measuring and communicating transit’s overall safety and security impacts, and providing better guidance concerning how users and communities can enhance transit safety and security. A summary version of this report was published as, “A New Transit Safety Narrative” Journal of Public Transportation, Vol. 17, No. 4, 2014, pp.121-142; at www.nctr.usf.edu/wp-content/uploads/2014/12/JPT17.4_Litman.pdf. It was also published as, The Hidden Traffic Safety Solution: Public Transportation, American Public Transportation Association (www.apta.com); at www.apta.com/mediacenter/pressreleases/2016/Pages/Hidden-Traffic-Safety-Solution.aspx Todd Litman 2013-2021 You are welcome and encouraged to copy, distribute, share and excerpt this document and its ideas, provided the author is given attribution.
    [Show full text]
  • Miss in the Middle Attacks on IDEA and Khufu
    Miss in the Middle Attacks on IDEA and Khufu Eli Biham? Alex Biryukov?? Adi Shamir??? Abstract. In a recent paper we developed a new cryptanalytic techni- que based on impossible differentials, and used it to attack the Skipjack encryption algorithm reduced from 32 to 31 rounds. In this paper we describe the application of this technique to the block ciphers IDEA and Khufu. In both cases the new attacks cover more rounds than the best currently known attacks. This demonstrates the power of the new cryptanalytic technique, shows that it is applicable to a larger class of cryptosystems, and develops new technical tools for applying it in new situations. 1 Introduction In [5,17] a new cryptanalytic technique based on impossible differentials was proposed, and its application to Skipjack [28] and DEAL [17] was described. In this paper we apply this technique to the IDEA and Khufu cryptosystems. Our new attacks are much more efficient and cover more rounds than the best previously known attacks on these ciphers. The main idea behind these new attacks is a bit counter-intuitive. Unlike tra- ditional differential and linear cryptanalysis which predict and detect statistical events of highest possible probability, our new approach is to search for events that never happen. Such impossible events are then used to distinguish the ci- pher from a random permutation, or to perform key elimination (a candidate key is obviously wrong if it leads to an impossible event). The fact that impossible events can be useful in cryptanalysis is an old idea (for example, some of the attacks on Enigma were based on the observation that letters can not be encrypted to themselves).
    [Show full text]
  • Applications of Search Techniques to Cryptanalysis and the Construction of Cipher Components. James David Mclaughlin Submitted F
    Applications of search techniques to cryptanalysis and the construction of cipher components. James David McLaughlin Submitted for the degree of Doctor of Philosophy (PhD) University of York Department of Computer Science September 2012 2 Abstract In this dissertation, we investigate the ways in which search techniques, and in particular metaheuristic search techniques, can be used in cryptology. We address the design of simple cryptographic components (Boolean functions), before moving on to more complex entities (S-boxes). The emphasis then shifts from the construction of cryptographic arte- facts to the related area of cryptanalysis, in which we first derive non-linear approximations to S-boxes more powerful than the existing linear approximations, and then exploit these in cryptanalytic attacks against the ciphers DES and Serpent. Contents 1 Introduction. 11 1.1 The Structure of this Thesis . 12 2 A brief history of cryptography and cryptanalysis. 14 3 Literature review 20 3.1 Information on various types of block cipher, and a brief description of the Data Encryption Standard. 20 3.1.1 Feistel ciphers . 21 3.1.2 Other types of block cipher . 23 3.1.3 Confusion and diffusion . 24 3.2 Linear cryptanalysis. 26 3.2.1 The attack. 27 3.3 Differential cryptanalysis. 35 3.3.1 The attack. 39 3.3.2 Variants of the differential cryptanalytic attack . 44 3.4 Stream ciphers based on linear feedback shift registers . 48 3.5 A brief introduction to metaheuristics . 52 3.5.1 Hill-climbing . 55 3.5.2 Simulated annealing . 57 3.5.3 Memetic algorithms . 58 3.5.4 Ant algorithms .
    [Show full text]
  • Design and Analysis of Lightweight Block Ciphers : a Focus on the Linear
    Design and Analysis of Lightweight Block Ciphers: A Focus on the Linear Layer Christof Beierle Doctoral Dissertation Faculty of Mathematics Ruhr-Universit¨atBochum December 2017 Design and Analysis of Lightweight Block Ciphers: A Focus on the Linear Layer vorgelegt von Christof Beierle Dissertation zur Erlangung des Doktorgrades der Naturwissenschaften an der Fakult¨atf¨urMathematik der Ruhr-Universit¨atBochum Dezember 2017 First reviewer: Prof. Dr. Gregor Leander Second reviewer: Prof. Dr. Alexander May Date of oral examination: February 9, 2018 Abstract Lots of cryptographic schemes are based on block ciphers. Formally, a block cipher can be defined as a family of permutations on a finite binary vector space. A majority of modern constructions is based on the alternation of a nonlinear and a linear operation. The scope of this work is to study the linear operation with regard to optimized efficiency and necessary security requirements. Our main topics are • the problem of efficiently implementing multiplication with fixed elements in finite fields of characteristic two. • a method for finding optimal alternatives for the ShiftRows operation in AES-like ciphers. • the tweakable block ciphers Skinny and Mantis. • the effect of the choice of the linear operation and the round constants with regard to the resistance against invariant attacks. • the derivation of a security argument for the block cipher Simon that does not rely on computer-aided methods. Zusammenfassung Viele kryptographische Verfahren basieren auf Blockchiffren. Formal kann eine Blockchiffre als eine Familie von Permutationen auf einem endlichen bin¨arenVek- torraum definiert werden. Eine Vielzahl moderner Konstruktionen basiert auf der wechselseitigen Anwendung von nicht-linearen und linearen Abbildungen.
    [Show full text]
  • AES3 Presentation
    Cryptanalytic Progress: Lessons for AES John Kelsey1, Niels Ferguson1, Bruce Schneier1, and Mike Stay2 1 Counterpane Internet Security, Inc., 3031 Tisch Way, 100 Plaza East, San Jose, CA 95128, USA 2 AccessData Corp., 2500 N University Ave. Ste. 200, Provo, UT 84606, USA 1 Introduction The cryptanalytic community is currently evaluating five finalist algorithms for the AES. Within the next year, one or more ciphers will be chosen. In this note, we argue caution in selecting a finalist with a small security margin. Known attacks continuously improve over time, and it is impossible to predict future cryptanalytic advances. If an AES algorithm chosen today is to be encrypting data twenty years from now (that may need to stay secure for another twenty years after that), it needs to be a very conservative algorithm. In this paper, we review cryptanalytic progress against three well-regarded block ciphers and discuss the development of new cryptanalytic tools against these ciphers over time. This review illustrates how cryptanalytic progress erodes a cipher’s security margin. While predicting such progress in the future is clearly not possible, we claim that assuming that no such progress can or will occur is dangerous. Our three examples are DES, IDEA, and RC5. These three ciphers have fundamentally different structures and were designed by entirely different groups. They have been analyzed by many researchers using many different techniques. More to the point, each cipher has led to the development of new cryptanalytic techniques that not only have been applied to that cipher, but also to others. 2 DES DES was developed by IBM in the early 1970s, and standardized made into a standard by NBS (the predecessor of NIST) [NBS77].
    [Show full text]
  • Statistical Cryptanalysis of Block Ciphers
    STATISTICAL CRYPTANALYSIS OF BLOCK CIPHERS THÈSE NO 3179 (2005) PRÉSENTÉE À LA FACULTÉ INFORMATIQUE ET COMMUNICATIONS Institut de systèmes de communication SECTION DES SYSTÈMES DE COMMUNICATION ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE POUR L'OBTENTION DU GRADE DE DOCTEUR ÈS SCIENCES PAR Pascal JUNOD ingénieur informaticien dilpômé EPF de nationalité suisse et originaire de Sainte-Croix (VD) acceptée sur proposition du jury: Prof. S. Vaudenay, directeur de thèse Prof. J. Massey, rapporteur Prof. W. Meier, rapporteur Prof. S. Morgenthaler, rapporteur Prof. J. Stern, rapporteur Lausanne, EPFL 2005 to Mimi and Chlo´e Acknowledgments First of all, I would like to warmly thank my supervisor, Prof. Serge Vaude- nay, for having given to me such a wonderful opportunity to perform research in a friendly environment, and for having been the perfect supervisor that every PhD would dream of. I am also very grateful to the president of the jury, Prof. Emre Telatar, and to the reviewers Prof. em. James L. Massey, Prof. Jacques Stern, Prof. Willi Meier, and Prof. Stephan Morgenthaler for having accepted to be part of the jury and for having invested such a lot of time for reviewing this thesis. I would like to express my gratitude to all my (former and current) col- leagues at LASEC for their support and for their friendship: Gildas Avoine, Thomas Baign`eres, Nenad Buncic, Brice Canvel, Martine Corval, Matthieu Finiasz, Yi Lu, Jean Monnerat, Philippe Oechslin, and John Pliam. With- out them, the EPFL (and the crypto) would not be so fun! Without their support, trust and encouragement, the last part of this thesis, FOX, would certainly not be born: I owe to MediaCrypt AG, espe- cially to Ralf Kastmann and Richard Straub many, many, many hours of interesting work.
    [Show full text]
  • SAFER K-64: a Byte-Oriented Block-Ciphering Algorithm
    SAFER K-64: A Byte.Oriented Block-Ciphering Algorithm James L. Massey Signal and Information Processing Laboratory Swiss Federal Institute of Technology CH-8092 Ztirich Abstract: A new non-proprietary secret-key block-enciphering algorithm, SAFER K- 64 (for Secure And Fast Encryption Routine with a Key of length 64 bits) is described. The blocklength is 64 bits (8 bytes) and only byte operations are used in the processes of encryption and decryption. New cryptographic features in SAFER K-64 include the use of an unorthodox linear transform, called the Pseudo-Hadamard Transform, to achieve the desired "diffusion" of small changes in the plaintext or the key over the resulting ciphertext and the use of additive key biases to eliminate the possibility of "weak keys". The design principles of K-64 are explained and a program is given, together with examples, to define the encryption algorithm precisely. 1. Introduction This paper describes a new block encryption algorithm called SAFER K-64 (for Secure And Fast Encryption Routine with a Key of length 64 bits) that the author recently developed for Cylink Corporation (Sunnyvale, CA, USA) as a non-proprietary cipher. SAFER K-64 is a byte-oriented block enciphering algorithm. The block length is 8 bytes (64 bits) for plaintext and ciphertext; the user-selected key is also 8 bytes (64 bits) in length. SAFER K-64 is an interated cipher in the sense that encryption is performed by applying the same transformation repeatedly for r rounds, then applying an output transformation; r = 6 is recommended but larger values of r can be used if desired for even greater security.
    [Show full text]
  • Excavations at Giza 1988-1991
    THE oi.uchicago.edu ORIENTAL I NEWS & NOTES NO. 135 FALL 1992 © THE ORIENTAL INSTITUTE OF THE UNIVERSITY OF CHICAGO EXCAVATIONS AT GIZA 1988-1991: The Location and Importance of the Pyramid Settlement By Mark Lehner, Associate Professor of Egyptology, The Oriental Institute of the University of Chicago Eight years ago I rendered the Giza to see if this change from labor camp limestone from quarries across the Pyramids Plateau in an isometric to temple community could be traced Nile Valley that were used for the fine drawing adapted from existing contour in the archaeological record. outer casing of the pyramids. Other maps to illustrate how the landscape material also had to be delivered: raw affected the mobilization of the Fourth Geomorphology at Giza presents foodstuff for the workers, fuel for Dynasty Egyptians (ca. 2550 B.C.) for important clues about the location of preparing bread and beer, the im­ the building of the Great Pyramid of the third millennium settlement. A mense quantities of gypsum mortar Khufu, the first pyramid on the plateau wadi or valley separates the used in building the Giza pyramids, (fig. 1). I thought that this first major Mokattam Formation, on which the copper tools, etc. Geological borings construction project must have pyramids rest, from the Maadi Forma­ in the area indicate a quay or revet­ determined the way that the rest of the tion to the south (fig. 2). This wadi, ment of some kind just a little further architecture and settlement developed known as the "Main Wadi," probably north of the mouth of the Main Wadi across the landscape over the three served as the conduit for building in front of the Khafre Valley Temple.
    [Show full text]
  • Petrie, W. M. Flinders. the Pyramids and Temples of Gizeh. London
    THE PYRAMIDS AND TEMPLES OF GIZEH Drawing by F. Petrie W.M FLINDERS PETRIE with an update by ZAHI HAWASS THE PYRAMIDS AND TEMPLES OF GIZEH. GREAT PYRAMID. SMALL PYRAMIDS. PE.R1 BOLUS. SMALL PYRAMIDS. THIRD PYRAMID. PERlBOLUS. EXCAVATION. SEGOND PYRAMID. THE NINE PYRAMIDS OF GIZEH. FROM THE SOUTH . THE PYRAMIDS AND TEMPLES OF GIZEH. BY W. M. FLINDERS PETRIE, Author of "Inductive Metrology," "Stonehenge," "Tanis," &c. NEW AND REVISED EDITION. HISTORIES & MYSTERIES OF MAN LTD. LONDON, ENGLAND 1990 Printed in the U.S.A. © Zahi Hawass Further Titles in Series include: I) BALLAS by J. E. Quibell II) The RAMESSEUM by J. E. Quibell & The Tomb of PTAHHETEP by F. L. L. Griffith III) EL KAB by J. E. Quibell IV) HIERAKONPOLIS I by J. E. Quibell V) HIERAKONPOLIS II by F. W. Green and J. E. Quibell VI) EL ARABAH by J. Garstang VII) MAHASNA by J. Garstang VIII) TEMPLE OF THE KINGS AT ABYDOS by A. St. G. Caulfield IX) The OSIREION by Margaret Alice Murray X) SAQQARA MASTABAS I by Margaret Alice Murray SAQQARA MASTABAS II by Margaret Alice Murray HYKSOS & ISRAELITE CITIES Double Volume by Petrie & Duncan ANCIENT RECORDS OF EGYPT by James Henry Breasted ANCIENT RECORDS OF ASSYRIA by David Luckenbill THE CHRONOLOGY OF ANCIENT KINGDOMS AMENDED by Sir Isaac Newton STONEHENGE by Petrie. Updated by Gerald Hawkins TELL EL HESY (LACHISH) by W. M. Flinders Petrie A HISTORY OF EGYPTIAN ARCHITECTURE by Alexander Badawy For further details please write for catalogue to HISTORIES & MYSTERIES OF MAN LTD. The Glassmill 1, Battersea Bridge Road London SW11 3BG ENGLAND ISBN 1-85417-051-1 THE FIRST EDITION OF THIS WORK WAS PUBLISHED WITH THE ASSISTANCE OF A VOTE OF ONE HUNDRED POUNDS FROM THE GOVERNMENT-GRANT COMMITTEE OF THE ROYAL SOCIETY.
    [Show full text]