2017
DOI: 10.3844/jcssp.2017.735.747
|View full text |Cite
|
Sign up to set email alerts
|

Randomness Analysis of DES Ciphers Produced with Various Dynamic Arrangements

Abstract: Abstract:Over the past few years, researchers have devoted efforts to enhance the original DES encryption algorithm. These enhancements focus on improving multiple perspectives of the algorithm through enhancing its internal components to deliver a robust DES variant against different kinds of typical attacks such as linear and differential crypto analysis, in addition to the newly evolved attacks such as differential power analysis attacks. In fact the output of existing solutions have enhanced the ciphertext… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 25 publications
0
1
0
Order By: Relevance
“…LFSR uses a linear feedback function and a shift register for its key generation process while chaotic encryption uses a One-dimensional Logistic map for its key generation. Furthermore, two variants of DES: Dynamic DES (DDES) and Hashed DES (HDES) were proposed in [ 13 ]. DDES uses seed generator, Pseudo-Random Generator (PRG), boxes generator, seed filter and seed distributor to organize the relationship between the S-boxes and the generated P-box arrangements during each round of the encryption and decryption process.…”
Section: Related Workmentioning
confidence: 99%
“…LFSR uses a linear feedback function and a shift register for its key generation process while chaotic encryption uses a One-dimensional Logistic map for its key generation. Furthermore, two variants of DES: Dynamic DES (DDES) and Hashed DES (HDES) were proposed in [ 13 ]. DDES uses seed generator, Pseudo-Random Generator (PRG), boxes generator, seed filter and seed distributor to organize the relationship between the S-boxes and the generated P-box arrangements during each round of the encryption and decryption process.…”
Section: Related Workmentioning
confidence: 99%