Boomerang Analysis of Permutation Function of 3D-AES Block Cipher
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2015, Vol 3, Issue 2
Abstract
Boomerang analysis is a type of differential attack that use two bits of key difference and comparing both to examine any differences in bit after encryption. This paper describe boomerang analysis of permutation function of three-dimensional Advanced Encryption Standard or 3D-AES. The objective of this paper is to analyze 3D-AES security using boomerang cryptanalysis. The new block cipher algorithm not been tested by boomerang analysis before. From boomerang cryptanalysis on 3D-AES block cipher, from the experiment and significance results, it can be concluded 3D-AES block cipher is secure using boomerang analysis
Authors and Affiliations
Suriyani Ariffin, Shahrizal Arshad
CNC Machine Technologies: A Review
Portable, interoperable, and flexible are the objectives of following generations of computer-controlled technologies G-codes have long been used by CNC production instruments for component programmers and are now seen a...
Plant Phyto-Chemicals as Plant-Producing Fungal Agents: A Review
Plant fungus destroys vast swaths of agriculture. Fungus has been connected to a number of plant-based illnesses, posing considerable economic challenges. Plant fungus seeks to get beyond the plant's immune system by act...
A Review Study on 4G Security
The introduction of the Long Term Evolution (LTE) technology in recent technologies has revolutionized Fourth Generation, 4G Network communication, allowing users to receive high-speed data up to 100 MHz. The problem of...
Self-Healing Technology of Asphalt Pavements
Cap heal reduces the environmental pollution and improves the performance of asphalt pavement. Since large amount of budget is allocated to road construction, so there is a need to implement more economically and environ...
Performance Comparison of Efficient Identity Based Signature Schemes
In a conventional public key crypto system, the participants must verify the certificate prior to use the public key. The main drawback of the certificate in conventional public key system are large storage, large comput...