7 research outputs found

    The MacGuffin block cipher algorithm

    Full text link

    Структурна організація алгоритмів симетричного блокового шифрування

    Get PDF
    Досліджено базові підходи та особливості структурної організації сучасних алгоритмів симетричного блокового шифрування (АСБШ). Розроблено та досліджено структурну організацію узагальненого АСБШ. Запропоновано та досліджено структурну організацію складових процедур АСБШ, їх класифікацію, аналітичні вирази та графічну інтерпретацію. Наведені та проаналізовані основні підходи до виконання складових процедур АСБШ.Base approaches and peculiarities of the structural organization of the modern symmetric block encryption algorithm (SBEA) are investigated. A structural organization of generalized SBEA is developed and analyzed. The structural organization of the components of the SBEA procedures, their classification, the analytical equations and the graphical interpretation are proposed and investigated. The main approaches of the SBEA component parts execution are considered and analyzed

    Cryptographic Criteria on Vector Boolean Functions

    Get PDF

    Safe Cryptography Algorithms

    Get PDF
    V této práci jsou popsány současné kryptografické algoritmy, porovnání jejich vlastností, silné a slabé stránky a vhodné případy použití jednotlivých algoritmů. Hlavními tématy jsou bezpečnost algoritmů, jejich chyby, vylepšení a odolnost proti průnikům. Jako doplněk k šifrám je věnována pozornost i hašovacím funkcím. Také jsou ukázány nejběžnější metody kryptoanalýzy. Jako použití popsaných algoritmů v praxi uvádím systémy pro zabezpečený přenost dat, kterými jsou SSH a SSL/TLS a je proveden také praktický útok na SSL spojení. V závěru se nachází shrnutí a doporučení vybraných bezpečných algoritmů pro další použití a bezpečné parametry spojení pro SSH a SSL/TLS.In this thesis there is description of cryptographic algorithms. Their properties are being compared, weak and strong points and right usage of particular algorithms. The main topics are safeness of algorithms, their bugs and improvements and difficulty of breaching. As a complement to ciphers there are also hash functions taken in consideration. There are also showed the most common methods of cryptanalysis. As a practical application of described algorithms I analyze systems for secure data transfer SSH and SSL/TLS and demonstrate an attack on SSL connection. In conclusion there is recommendation of safe algorithms for further usage and safe parameters of SSH and SSL/TLS connections.

    A Salad of Block Ciphers

    Get PDF
    This book is a survey on the state of the art in block cipher design and analysis. It is work in progress, and it has been for the good part of the last three years -- sadly, for various reasons no significant change has been made during the last twelve months. However, it is also in a self-contained, useable, and relatively polished state, and for this reason I have decided to release this \textit{snapshot} onto the public as a service to the cryptographic community, both in order to obtain feedback, and also as a means to give something back to the community from which I have learned much. At some point I will produce a final version -- whatever being a ``final version\u27\u27 means in the constantly evolving field of block cipher design -- and I will publish it. In the meantime I hope the material contained here will be useful to other people

    The MacGuffin Block Cipher Algorithm

    No full text
    . This paper introduces MacGuffin, a 64 bit "codebook" block cipher. Many of its characteristics (block size, application domain, performance and implementation structure) are similar to those of the U.S. Data Encryption Standard (DES). It is based on a Feistel network, in which the cleartext is split into two sides with one side repeatedly modified according to a keyed function of the other. Previous block ciphers of this design, such as DES, operate on equal length sides. MacGuffin is unusual in that it is based on a generalized unbalanced Feistel network (GUFN) in which each round of the cipher modifies only 16 bits according to a function of the other 48. We describe the general characteristics of MacGuffin architecture and implementation and give a complete specification for the 32-round, 128-bit key version of the cipher. 1 Introduction Feistel ciphers [1] operate by alternately encrypting the bits in one "side" of their input based on a keyed non-linear function of the bits in ..
    corecore