In this paper presents an enhancement to the encryption function of rc5 algorithm which addresses the poor hit propagation or avalanche effect in the early rounds of the algorithm. This weakness has made rcS to use ex...
详细信息
ISBN:
(纸本)9781728113227
In this paper presents an enhancement to the encryption function of rc5 algorithm which addresses the poor hit propagation or avalanche effect in the early rounds of the algorithm. This weakness has made rcS to use excessive rounds in its encryption function. The enhanced rc5 algorithm (Erc5a) improves bit propagation as early as first round without using expensive operations in the design of rc6. Comparative security evaluation has been conducted for the proposed Erc5a and classic rc5. Simulation in C language both for rc5-32/12/16 and Erc5a-32112/16 was performed by applying 36 million random plaintexts (64-hit) for each round resulted in a 74.41% increase in hamming distance in the first round, 35.48% in the second round, and 9.67% in the third round which means that the proposed Erc5a algorithm has a better hit propagation in its encryption function. Thus, the resulting enhancement can reduce the number of rounds, reduce memory requirement and achieve better performance for all existing rcS implementations especially for lightweight devices where these properties are deemed significant.
rc5 algorithm is lighweight in nature because it has low memory and low power requirement which makes it suitable to be implemented in devices with limited power and memory supply. However, it suffers from slow encryp...
详细信息
ISBN:
(纸本)9781538635278
rc5 algorithm is lighweight in nature because it has low memory and low power requirement which makes it suitable to be implemented in devices with limited power and memory supply. However, it suffers from slow encryption speed compared to other encryption algorithms. The main purpose of this paper is to enhance this algorithm to increase its encryption speed through a simple yet fast random number addition-then-append key expansion technique. The enhancement includes the generation of random number to be added to the generated key which will be repeated for two rounds and later to be appended, to produce a key material. Additional blocks and bitwise operations are also included in the enhancement. Results show that the enhanced rc5 (Erc5) algorithm positively outperforms the traditional rc5 algorithm and successfully increased its encryption speed.
The main goal of this paper is to present of security evaluation of block cipher use in wireless network. Information security contributes directly to increase level of trust between users by providing an assurance of...
详细信息
ISBN:
(纸本)9781479956340
The main goal of this paper is to present of security evaluation of block cipher use in wireless network. Information security contributes directly to increase level of trust between users by providing an assurance of confidentiality, integrity, and availability of sensitive information of the network. In this paper, evaluations analysis of rc5, Blowfish and DES block cipher algorithms have been done on the basis of block size, numbers of round, and key size of evaluation modeling based on fuzzy logic tool of MA TLAB 2012a. Three metrics are considered for using crypto algorithms for wireless network security. These three algorithms have a variable block size, number of rounds and a variable key size in their structure. Performances of rc5, Blowfish and DES algorithms have been evaluated on variables range of metrics of key size, number of rounds, and block size in this paper. Presents the results of evaluation for security level of crypto have shown the security level depending on the structure of algorithm.
暂无评论