2019
DOI: 10.1016/j.jisa.2019.02.001
|View full text |Cite
|
Sign up to set email alerts
|

The benefit of using chaos in key schedule algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 51 publications
0
5
0
Order By: Relevance
“…e authors in [17] identified the weaknesses in the key schedule algorithm of RC4. In [18], the authors described the benefits of using chaos in the key schedule algorithm, and in [19], the authors presented a multidimensional key algorithm for RC6. However, in all of these studies, no criteria were discussed for evaluating the cryptographic strength of the key schedule algorithms.…”
Section: Introductionmentioning
confidence: 99%
“…e authors in [17] identified the weaknesses in the key schedule algorithm of RC4. In [18], the authors described the benefits of using chaos in the key schedule algorithm, and in [19], the authors presented a multidimensional key algorithm for RC6. However, in all of these studies, no criteria were discussed for evaluating the cryptographic strength of the key schedule algorithms.…”
Section: Introductionmentioning
confidence: 99%
“…Differential attacks are concerned with attacking the master secret key, where attackers try to find out whether a particular modification to the master key might lead to a specific difference in the key output of each round [12]. As demonstrated in Sections 4.7 and 4.8 through experimentation, a 1-bit change to the master secret key will get NBCR very close to the optimal value of 50%.…”
Section: Differential Attack Analysismentioning
confidence: 99%
“…In the literature, designing a strong and secure KEA has received less attention compared to encryption techniques [10], [11]. However, Harmouch and El Kouch [12] incorporated the concept of chaos into the key schedule (expansion) algorithm, resulting in the development of a new key scheduling method called CKSA, which is based on logic maps. This suggested algorithm is a one-way function that guarantees effective confusion and diffusion, as well as a good avalanche effect.…”
Section: Introductionmentioning
confidence: 99%
“…The KSA of AES was also improved by Shivani [34] by introducing three secret keys instead of one to increase the keyspace and overall system security. In addition, a highly efficient and independent KSA has been introduced, which uses chaos to generate round keys [35]. This research indicates that randomness, avalanche effect, the difference between round keys, and linear cryptanalysis are important security measures.…”
Section: Introductionmentioning
confidence: 99%