6 Rijndael S-box S RD . 

6 Rijndael S-box S RD . 

Source publication
Thesis
Full-text available
This thesis develops the theoretical foundations and designs an open collection of C++ classes, called VBF, designed for analyzing vector Boolean functions (functions that map a Boolean vector to another Boolean vector) from a cryptographic perspective. This new implementation uses the NTL library from Victor Shoup, adding new modules which complem...

Similar publications

Conference Paper
Full-text available
This paper manages the merger of the two lightweight stream figures – A5/1 and Trivium. The thought is to make the key stream more secure and to remove the vulnerabilities of the individual ciphers. The bits created by the Trivium figure (yield) will go about as the contribution of the A5/1 figure. The registers utilized as a part of the A5/1 figur...
Article
There can be performance and vulnerability concerns with block ciphers, thus stream ciphers can used as an alternative. Although many symmetric key stream ciphers are fairly resistant to side-channel attacks , cryptographic artefacts may exist in memory. This paper identifies a significant vulnerability within OpenSSH and OpenSSL and which involves...
Preprint
Full-text available
There can be performance and vulnerability concerns with block ciphers, thus stream ciphers can used as an alternative. Although many symmetric key stream ciphers are fairly resistant to side-channel attacks, cryptographic artefacts may exist in memory. This paper identifies a significant vulnerability within OpenSSH and OpenSSL and which involves...
Article
Full-text available
Although stream ciphers are widely utilized to encrypt sensitive data at fast speeds, security concerns have led to a shift from stream to block ciphers, judging that the current technology in stream cipher is inferior to the technology of block ciphers. This paper presents the design of an improved efficient and secure stream cipher called Blostre...
Preprint
Full-text available
This paper deals with the merger of the two lightweight stream ciphers – A5/1 and Trivium. The idea is to make the key stream generation more secure and to remove the attacks of the individual algorithms. The bits generated by the Trivium cipher (output) will act as the input of the A5/1 cipher. The registers used in the A5/1 cipher will be filled...

Citations

... The basis of many symmetric cryptoalgorithms is the use of so-called complication nodes (nonlinear replacement tables, S-boxes) [2]- [5]. It is on the cryptographic S-box properties that the stability of most symmetric ciphers to various cryptographic attacks is based (differential, linear, algebraic and other methods of cryptanalysis [6]- [9]. Thus, the analysis of nonlinear substitutions, the research of generation methods (search) and the analysis of cryptographic properties is an urgent and important scientific task. ...