2013
DOI: 10.5121/ijnsa.2013.5102
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers

Abstract: Modern Internet protocols support several modes of operation in encryption tasks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 9 publications
0
8
0
Order By: Relevance
“…Since message sizes vary, they are usually divided into fixed-size blocks, as required by the symmetric key cipher. Various operating modes have been devised to accommodate various message sizes using symmetric key ciphers, including electronic codebook (ECB) [15], cipher block chaining (CBC) [26], propagating cipher block chaining (PCBC) [24], cipher feedback (CFB) [27], output feedback (OFB) [9], counter (CTR) [22], and Galois counter mode (GCM) [23].…”
Section: Related Workmentioning
confidence: 99%
“…Since message sizes vary, they are usually divided into fixed-size blocks, as required by the symmetric key cipher. Various operating modes have been devised to accommodate various message sizes using symmetric key ciphers, including electronic codebook (ECB) [15], cipher block chaining (CBC) [26], propagating cipher block chaining (PCBC) [24], cipher feedback (CFB) [27], output feedback (OFB) [9], counter (CTR) [22], and Galois counter mode (GCM) [23].…”
Section: Related Workmentioning
confidence: 99%
“…AES encryption is flexible, more secured and fast [14] [20] [16]. It is a popular and secured encryption algorithm in the industry compared to DES [9] [12], but it is prone to side channel attacks.…”
Section: Advanced Encryption Standard (Aes)mentioning
confidence: 99%
“…After initial permutations, it undergoes 16-rounds of processing steps. It can operate in Cipher Block Chaining (CBC), Electronic Code Book (ECB), Cipher Feedback (CFB) and Output Feedback (OFB) modes [10] [12]. It is prone to Brute Force attack in which hacker attempts to break the key by applying all possible combinations of inputs.…”
Section: Data Encryption Standard (Des)mentioning
confidence: 99%