Conference Paper

# A Competitive Study of Cryptography Techniques over Block Cipher

Inf. Technol. Dept., Univ. Utara Malaysia, Sintok, Malaysia

DOI: 10.1109/UKSIM.2011.85 Conference: Computer Modelling and Simulation (UKSim), 2011 UkSim 13th International Conference on Source: IEEE Xplore

- Citations (21)
- Cited In (0)

- [Show abstract] [Hide abstract]

**ABSTRACT:**A key management protocol has been described that will allow the Data Encryption Standard (DES) to be integrated into electronic data processing systems for the purpose of obtaining communication security and file security. Several cryptographic keys have been defined that allow the desired key management protocol to be achieved. They are: • Host master key (KMO) • First variant of the host master key (KM1) • Second variant of the host master key (KM2) • Terminal master key (KMT) • Secondary communication key (KNC) • Secondary file key (KNF) • Primary communication key, or session key (KS) • Primary file key, or file key (KF).Ibm Systems Journal 02/1978; · 1.29 Impact Factor - [Show abstract] [Hide abstract]

**ABSTRACT:**In this Letter we address some basic questions about chaotic cryptography, not least the very definition of chaos in discrete systems. We propose a conceptual framework and illustrate it with different examples from private and public key cryptography. We elaborate also on possible limits of chaotic cryptography.Physics Letters A 06/2007; · 1.63 Impact Factor - [Show abstract] [Hide abstract]

**ABSTRACT:**We present a new private key cryptosystem based on the finite-field wavelet. The encryption and decryption are performed by the synthesis and analysis banks of the nonlinear finite-field wavelet transform, whose filter coefficients are determined by the keys of the users. We exploit the polyphase representation of the wavelets to introduce a shared key mechanism for the wavelet cryptosystem. We propose to use wavelets that operate over GF(256) and a nonlinear device that performs a mapping on the field elements to their inverse in the field. The introduced cryptographic system can operate in either stream-cipher or block-cipher modes depending on whether the filterbanks perform linear or circular convolution. The block cipher system has a key length of 16 symbols (128 bits) and an input block size of 30 symbols (240 bits). To evaluate the efficiency of the developed two-round wavelet cryptographic scheme, we compare it with DES and AES. Our results suggest that the wavelet cryptosystem has comparable computational complexity to AES and approximately half the complexity of DES. The security is tied to the length of the wavelet basis function and to the nonlinearity within the wavelet transform. We study the security of the block-cipher wavelet cryptosystem in response to classical attacks and those specific to this algorithm, particularly those which use variations of the divide and conquer, interpolation attack, and discrete Fourier transform techniques. We show that chosen ciphertext attacks of the wavelet encryption system can reduce to the problem of solving a set of nonlinear equations over finite fields. By considering existing classical and structure-specific attacks, we conclude that the lowest complexity of any of these attacks is greater than an exhaustive key search.IEEE Transactions on Signal Processing 11/2004; · 3.20 Impact Factor

Data provided are for informational purposes only. Although carefully collected, accuracy cannot be guaranteed. The impact factor represents a rough estimation of the journal's impact factor and does not reflect the actual current impact factor. Publisher conditions are provided by RoMEO. Differing provisions from the publisher's actual policy or licence agreement may be applicable.