Novel Approach Transforming Stream Cipher to Block Cipher

Author(s):  
Nitin Jain ◽  
Surendra Singh Chauhan
2011 ◽  
Vol 128-129 ◽  
pp. 637-641
Author(s):  
Lan Luo ◽  
Qiong Hai Dai ◽  
Chun Xiang Xu ◽  
Shao Quan Jiang

The cipher algorithms are categorized by block cipher, stream cipher and HASH, and they are weighed in faithful transmission which is known as independent condition. In faithful transmission, the ciphers are studied because of their root cipher. Intelligent application of ciphers is a direction that uses Bayesian model of cognition science. Bayesian inference is a rational engine for solving such problems within a probabilistic framework, and consequently is the heart of most probabilistic models of weighing the ciphers. The approach of this paper is that ciphers, which are considered as a suitable weight cipher to kinds of networks, are ranged based on root ciphers. This paper shows the other kinds of transformation among the different cipher algorithms themselves.


2010 ◽  
Vol 1 (25) ◽  
pp. 15-21 ◽  
Author(s):  
Shish Ahmad ◽  
DR. Mohd. Rizwan beg ◽  
Dr. Qamar Abbas ◽  
Jameel Ahmad ◽  
Syed Mohd Atif

Author(s):  
Keith M. Martin

In this chapter, we focus on symmetric encryption. We begin by identifying two different types of symmetric encryption algorithm, namely, stream and block ciphers. We discuss the basic idea behind a stream cipher and consider their properties and applications. We then introduce block ciphers. We focus on two extremely important and influential block cipher algorithms, the Data Encryption Standard and the Advanced Encryption Standard, discussing the history of their development as well as their basic design. We then introduce the modes of operation of a block cipher, explaining why different modes have been proposed. We examine in detail four of the most well-established modes of operation and their core properties, as well as classifying other modes of operation.


2017 ◽  
Vol 20 (3) ◽  
pp. 685-698 ◽  
Author(s):  
Aissa Belmeguenai ◽  
Zahir Ahmida ◽  
Salim Ouchtati ◽  
Rafik Djemii

2014 ◽  
Vol 644-650 ◽  
pp. 2768-2771
Author(s):  
Hui Shi ◽  
Jian Wei Lu ◽  
Yu Feng Ji ◽  
Chao Wu ◽  
Jing Gong ◽  
...  

The key-stream generator is the most important algorithm component of the stream cipher and the security of the stream cipher is based on the property of the key-stream generator. At the present, it is still an important development direction of the stream cipher algorithm that the high performance key-stream generators are constructed with complex block cipher algorithms. This paper puts forward the new type of the key-stream generator based on the AES algorithm. This method is based on the OFB mode of the AES algorithm, combined with the variable-step feedback shift. Then the paper analyses the randomness of the key-stream produced by the new key-stream generator. This new key-stream generator really improves the cryptographic properties of the key stream generator and to enhance the security of stream cipher effectively.


Author(s):  
Mohammad A. AlAhmad

<span>This paper introduces a new cryptographic hash function that follows sponge construction. Paper begins with outlining the structure of the construction. Next part describes the functionality of Titanium and cipher used. A competition between block cipher and stream cipher is presented and showed the reason of using block cipher rather than stream cipher. Speed performance is calculated and analyzed using state-of-art CPUs.</span>


2018 ◽  
Vol 8 (3) ◽  
pp. 205
Author(s):  
R. Benny Gandara

Standar IEEE 802.15.4 merupakan standar acuan pengembangan protokol yang diterapkan untuk teknologi industrial wireless sensor network pada saat ini. Unsur keamanan data dalam industrial wireless sensor network perlu untuk diperhatikan karena dampak gangguan yang timbul akan dapat berpengaruh secara langsung pada proses industri yang sedang beroperasi dan berdampak pada keselamatan pekerja, peralatan dan lingkungan serta keekonomian. Metode enkripsi adalah metode umum yang dipergunakan dalam perlindungan data pada sistem wireless sensor network. Metode enkripsi pada layer physical dengan menggunakan algoritma stream cipher Rabbit dipergunakan sebagai metode alternatif perlindungan data pada sistem aplikasi industrial wireless sensor network yang mana pada umumnya menggunakan metode enkripsi block cipher pada lapisan upper layer. Algoritma Rabbit akan dibandingkan dengan algoritma RC4 yang telah diteliti sebelumnya. Dari hasil simulasi, algoritma Rabbit dengan jumlah kunci yang lebih pendek dan cipher text yang lebih sedikit dapat memberikan hasil yang lebih baik untuk nilai avalanche effect, entrophy dan penggunaan CPU dibandingkan dengan algoritma RC4. Meskipun mendapatkan hasil yang bervariasi pada penggunaan memori dan end to end delay, algoritma Rabbit pada jumlah node tertentu masih dapat memenuhi standar kebutuhan industri untuk aplikasi sektor migas.


Sign in / Sign up

Export Citation Format

Share Document