Boomerang Analysis of Permutation Function of 3D-AES Block Cipher
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2015, Vol 3, Issue 2
Abstract
Boomerang analysis is a type of differential attack that use two bits of key difference and comparing both to examine any differences in bit after encryption. This paper describe boomerang analysis of permutation function of three-dimensional Advanced Encryption Standard or 3D-AES. The objective of this paper is to analyze 3D-AES security using boomerang cryptanalysis. The new block cipher algorithm not been tested by boomerang analysis before. From boomerang cryptanalysis on 3D-AES block cipher, from the experiment and significance results, it can be concluded 3D-AES block cipher is secure using boomerang analysis
Authors and Affiliations
Suriyani Ariffin, Shahrizal Arshad
Sentiment Analysis: A Survey
Traditional approaches to sentiment classification rely on lexical features, syntax-based features or a combination of the two. Word senses used as features show promise, we also examine the possibility of using similari...
Review on Workflow Scheduling In Cloud Environment: A Comprehensive Study
For enterprise application development, cloud computing is going to new-fangled paradigm that meets the needs of today's enterprises and helps them efficiently executing workflows in business and scientific applications....
Overview on Green Concrete Comprised of Farming Waste Residues
The rising global market for construction has resulted in an increase in the usage of concrete. On the other hand, traditional concrete-making materials are not totally ecologically friendly, driving research towards gre...
Analyzing Target Customer Behavior Using Data Mining Techniques for E- Commerce Data
In this scenario Customer satisfaction is no longer satisfied with a simple listing of marketing contacts, but wants detailed information about Customers past purchase as well as prediction of future purchases. From long...
Convolutional Neural Network-based Object Detection
In the midst of the efforts in an item identification, region CNNs (rCNN) stands out as the most impressive, combining discriminatory exploration, CNNs, sustenance vector machines (SVM), and bounding box regression to ac...