Differential Cryptanalysis on S-DES
Journal Title: INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY - Year 2012, Vol 1, Issue 2
Abstract
In this paper differential attack on S-DES is carried out. S-DES is the reduced version of DES algorithm. This algorithm operates on 8-bit message block with 10-bit key and DES operates on 64-bit message block with 56-bit key. This paper analyzed the differential attack on S-DES. Differential attack is used to break a cipher by trying each possible key.
Authors and Affiliations
Keshav Raj, Bharti Sharma, Neeraj Kumar, Dr. Dalveer Kaur
Cross Border Mergers and Acquisitions by Indian firms- An Analysis of Pre and Post Merger performance
The corporate sector all over the world is restructuring its operations through different types of consolidation strategies like mergers and acquisitions in order to face challenges posed by the new pattern of glob...
CONSUMERS PERCEPTION TOWARDS ONLINE SHOPPING- THE CASE OF PUNJAB
India has more than 100 million internet users out of which one half opt for online purchases and the number is rising sharply every year. The growth in the number of online shoppers is greater than the growth in Interne...
A Comparative Study of Service Quality of Life Insurance Companies in IndiaA Comparative Study of Service Quality of Life Insurance Companies in India
The Indian Life Insurance sector has witnessed a major revamp in 1999 with the establishment of Insurance Regulatory and Development Authority (IRDA) and subsequent entry of Private sector players. These changes are affe...
An extension to l-calculus for Distributed Functional Actor Programming
In this paper, we present the lAD-calculus witch is an elementary functional distributed actor language with a new approach of message communication between actors in a distributed environment. This strategy is based on...
How do Humans Interact with Chatbots?: An Analysis of Transcripts
Chatbots enable machines to emulate human conversation, and recent developments have resulted in many online systems for the public to use. Although a few studies have investigated how humans interact with such programs,...