Figure 1 - uploaded by Vincent Rijmen
Content may be subject to copyright.
Family tree of cryptographic primitive recycling. 

Family tree of cryptographic primitive recycling. 

Source publication
Article
Full-text available
In part 1, we introduced "green cryptography" as a recycling-based paradigm for building mature (secure) and minimalist (simple) cryptographic implementations, using the AES (Advanced Encryption Standard) as our building block. We established that the AES is the poster child for green cryptography, because, as a standard, it receives more cryptanal...

Context in source publication

Context 1
... outlaws, and even the sister's best friend's boyfriend's grandmother's hairdresser -if they recycled something, they're on some branch of the recycling tree. In Figure 1, we see two essential elements of Rijndael that have been recycled numerous times. The first element is the branch number; this concept was proposed in 1995 as a measure for the diffusion quality of a map. ...

Similar publications

Article
Full-text available
Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provid...
Article
Full-text available
In this paper, we have generalized and modified the play fair cipher. We have introduced confusion and diffusion. The cryptanalysis carried out in this analysis has shown that the proposed play fair cipher is a strong one. The role of cryptography in today’s world is increasing day by day. Information is flowing from are place to another on the net...
Article
Full-text available
There are many algorithms used with different purposes in the area of cryptography. Amongst these, Genetic Algorithms have been used, particularly in the cryptanalysis of block ciphers. Interest in the use of and research on such algorithms has increased lately, with a special focus on the analysis and improvement of the properties and characterist...
Article
Full-text available
This paper deals with the types of cryptography and different keys in cryptography. It gives a brief description about symmetric key algorithms. In the existing system many of the algorithms encrypt the plain text to cipher text. But the algorithms apply the same encryption process to the entire plain text. So if the same type of characters are rep...
Article
Full-text available
The internet today is being used by millions of users for a large variety of commercial and non commercial purposes. It is controlled by different entities. It is mainly used as an efficient means for communication, entertainment and education. With the rapid growth of internet, there is a need for protecting confidential data. The Internet was how...

Citations

Chapter
At the moment the most widely used are symmetric cryptographic transformations, in particular, stream ciphers. The development of an efficient synchronous stream cipher is reduced to the construction of a pseudo-random sequence generator with defined cryptographic properties. It should be noted that in devices with limited computing power, low volume and low power consumption the implementation of reliable cryptographic methods is extremely complicated. Limited physical parameters, low power consumption, low computing power and other characteristic attributes of “green” IT engineering forces the use of new approaches for designing cryptographic protection tools. The main cryptographic transformations are considered and experimental studies of performance and statistical security are conducted. We propose new methods and hardware and software tools for lightweight stream encryption that meet the current requirements of “green” IT engineering. It is proposed synthesis method for the construction of nonlinear-feedback shift register, which allows creating nonlinear registers with design features that correspond to the certain predefined criteria.