An application of the khumbelo function on the camellia algorithm to prevent attacks in iot devices
KD Muthavhine, M Sumbwanyambe - IEEE Access, 2023 - ieeexplore.ieee.org
Camellia is an encryption algorithm implemented in many Internet of Things (IoT) devices.
However, intruders attack the Camellia cipher using Substitution Box (S-Box) distinguishers …
However, intruders attack the Camellia cipher using Substitution Box (S-Box) distinguishers …
A proposed Development of Clock Control Stream Cipher based on Suitable Attack
SB Sadkhan - 2020 1st. Information Technology to Enhance e …, 2020 - ieeexplore.ieee.org
The feedback shift registers (FSR) is known to allow produce sequences with large period
and fast realization. It is well known that building block used for constructing a key-stream …
and fast realization. It is well known that building block used for constructing a key-stream …
Using the Muthavhine Function to Modify Skipjack Algorithm to Prevent LC and DC Attacks on IoT Devices
KD Muthavhine, M Sumbwanyambe - IEEE Access, 2024 - ieeexplore.ieee.org
The Skipjack algorithm is used by many Internet of Things (IoT) devices to secure and
encrypt data. Skipjack-encrypted data has been discovered to be vulnerable to Differential …
encrypt data. Skipjack-encrypted data has been discovered to be vulnerable to Differential …
[PDF][PDF] Cryptographic security using various encryption and decryption method
R Goyal, M Khurana - International Journal of Mathematical …, 2017 - mecs-press.net
Fast development in universal computing and the growth in radio/wireless and mobile
strategies have led to the extended use of application space for Radio Frequency (RFID) …
strategies have led to the extended use of application space for Radio Frequency (RFID) …
Preventing Differential Cryptanalysis Attacks Using a KDM Function and the 32-Bit Output S-Boxes on AES Algorithm Found on the Internet of Things Devices
KD Muthavhine, M Sumbwanyambe - Cryptography, 2022 - mdpi.com
Many Internet of Things (IoT) devices use an Advanced Encryption Standard (AES)
algorithm to secure data stored and transmitted during the communication process. The AES …
algorithm to secure data stored and transmitted during the communication process. The AES …
[PDF][PDF] A Review on Combined Attacks on Security Systems
BS Rao, P Premchand - Int. J. Appl. Eng. Res, 2018 - academia.edu
Cryptology is a combination of both cryptography and cryptanalysis and is extensively used
to design security systems related to data, communication and networking domains. The …
to design security systems related to data, communication and networking domains. The …
[PDF][PDF] New design of tiny-block hybridization in AES
R Goyal, M Khurana - … Journal of Computer Network and Information …, 2017 - mecs-press.org
The cryptographic algorithm designed to enhance security in real life which storage track
and increase speed. This is kind of Feistel cipher which real use for the processes from …
and increase speed. This is kind of Feistel cipher which real use for the processes from …
[PDF][PDF] An Approach of Zero Correlation Linear Cryptanalysis
M Khurana, M Kumari - International Journal of Computer Science and … - ijcset.com
Differential and Linear Cryptanalysis are two most popular techniques that have been widely
used to attacks block ciphers to reveal its weakness in substitution and permutation network …
used to attacks block ciphers to reveal its weakness in substitution and permutation network …
[PDF][PDF] IMPOSSIBLE DIFFERENTIAL CRYPTANALYSIS ON REDUCED ROUND OF TINY AES
M Khurana, M Kumari - 2017 - academia.edu
The emerging need of the secure ciphers has lead to the designing and analysis of many
lightweight block ciphers. In this respect, many lightweight block ciphers have been …
lightweight block ciphers. In this respect, many lightweight block ciphers have been …
To Cryptanalyse PRESENT Lightweight Block Cipher using Zero Correlation Linear Cryptanalysis
M Khurana, M Kumari - INTERNATIONAL JOURNAL OF ENGINEERING …, 2017 - rjwave.org
Block cipher is in vogue due to its requirement for integrity, confidentiality and
authentication. With the rapid advances in small devices, such as Sensors, RFID tags …
authentication. With the rapid advances in small devices, such as Sensors, RFID tags …