2020
DOI: 10.1016/j.jisa.2019.102410
|View full text |Cite
|
Sign up to set email alerts
|

A novel approach for the development of the Twofish algorithm based on multi-level key space

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(16 citation statements)
references
References 5 publications
0
16
0
Order By: Relevance
“…It is also suitable for stream ciphering. Twofish's main work is built on the Feistel network, which has 16 iterations [16]. The algorithm of Twofish was created with simplicity in mind.…”
Section: Twofish Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…It is also suitable for stream ciphering. Twofish's main work is built on the Feistel network, which has 16 iterations [16]. The algorithm of Twofish was created with simplicity in mind.…”
Section: Twofish Algorithmmentioning
confidence: 99%
“…4-Pseudo-Hadamard Transforms (PHT): A PHT is a simple diffusion blending. Given two inputs a and b, the 32-bit PHT, for example, is defined as follows: a'= a + b mod 2 32 b' = a + 2 b mod 2 32 5-Whitening: Before the first round and after the last round, plain-text parts are combined with key components using XOR to increase the key's security versus assaults [16]. 6-Q-Permutation: The Q-Permutation is at the core of Twofish's design.…”
Section: -Substitution Boxes (S-box)mentioning
confidence: 99%
“…In [28], a variant of the Twofish algorithm with an increased complexity for multi-level keys adoptable for dynamic bit size inputs to improve its cryptographic strength that made it resistant against the differential attacks was adopted for encrypting images.…”
Section: Twofishmentioning
confidence: 99%
“…In the same year, Jabbar et al proposed a protocol using Magic Square of order 3 and used it in encryption [3]. In 2020, Kareem and Rahma introduced an amendment to the Twofish algorithm in cryptography, whereby 2 keys were used with several rounds, and multi-level keys were used for 4 different message sizes during the work in addition to the use of GF [10]. Later in 2021, Cuevas and Netzer proposed and developed a method based on magic squares and their relationship to cryptography and quantitative information and their relationship to the games [11].…”
Section: Introductionmentioning
confidence: 99%