2011
DOI: 10.5120/3311-4539
|View full text |Cite
|
Sign up to set email alerts
|

Variable Size Block Encryption using Dynamickey Mechanism 'VBEDM'

Abstract: The weak point of the existing block encryption scheme is that the plain text or encryption key could be easily exposed differential cryptanalysis or linear cryptanalysis, which is mostly used for decoding block encryption. This is because the encryption schemes have been designed for the fixed size encryption key. Another weak point of the existing block encryption algorithm is that it has a fixed permutation table and fixed number of encryption rounds.In order to overcome these weaknesses, an encryption algo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…This process is continued until the end of the plaintext for encryption. Out of XOR, each block is given a complex function where the encryption is performed based on the block size, the key of the pseudo-function, function table, and dynamic permutation [18].…”
Section: Variable Size Block Encryption Using Dynamic-key Mechanismmentioning
confidence: 99%
See 1 more Smart Citation
“…This process is continued until the end of the plaintext for encryption. Out of XOR, each block is given a complex function where the encryption is performed based on the block size, the key of the pseudo-function, function table, and dynamic permutation [18].…”
Section: Variable Size Block Encryption Using Dynamic-key Mechanismmentioning
confidence: 99%
“…Goldwasser and Micali proposed a randomized block encryption algorithm [14]. In the following years, some works are suggested in this area such as a block encryption algorithm for protecting multimedia context by randomizing permutations [15], block encryption efficient structures with variable input length [16], a message block encryption method based on key with randomized variable length (MRVLK) [17], and block encryption with a variable length by using a dynamic key mechanism [18].…”
Section: Introduction and Basic Conceptsmentioning
confidence: 99%
“…In addition to the diffusion and substitution layers of the SPN block ciphers, the authors in [13,14] recently proposed a way to animate with new XOR tables, implemented at the key addition layer. Besides, many ways of animating block ciphers have been studied as in [1,2,4,6,7,12]. In [1], Al-Wattar et al proposed a method to animate the AES block cipher at the diffusion layer.…”
Section: Introductionmentioning
confidence: 99%
“…A new encryption technique called Variable size Block Encryption using Dynamic -key Mechanism (VBEDM), which is designed with unlimited key size, dynamically changing permutation table based on the encryption key and variable block size for each round. To make the cryptanalyst difficult to make the plain text from the variety of compression algorithms the VBEDM used a compression technique based on key [24].…”
Section: Introductionmentioning
confidence: 99%