Differential cryptanalysis of the data encryption standard
Differential cryptanalysis of the data encryption standard
Linear cryptanalysis method for DES cipher
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
One Way Hash Functions and DES
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
The FEAL-8 Cryptosystem and a Call for Attack
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Differential Cryptanalysis of DES-like Cryptosystems
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Network Security Essentials: Applications and Standards (3rd Edition)
Network Security Essentials: Applications and Standards (3rd Edition)
Data transmission encryption and decryption algorithm in network security
SMO'06 Proceedings of the 6th WSEAS International Conference on Simulation, Modelling and Optimization
Hi-index | 0.00 |
A plaintext is separated into two parts, a fixed length part and a variable length part. The second part of the plaintext is encrypted to a cipher text using a key. In this paper, an encryption algorithm which encrypts the first part of the plaintext and the key of the second part to a cipher text is proposed. Basic computing operations, such as inserting dummy symbols, rotating, transposition, shifting, and complementation, are applied to encrypt plaintext to cipher text. The key used to encrypt the second part of cipher text can be retrieved by decryption of the first part of cipher text . It is secure for the cipher text transmitted through the network since the tables of cipher text are produced randomly and it is difficult to carry out cryptanalysis.