A Design of Block cipher-Secure Electronic Xenogenesis Alorithm for Efficient Plaintext Management in Block Cryptosystem

  • Published : 2003.04.01

Abstract

Presently, etwork is being in the existence as an influence can not be neglected. This rapid progress of network has gone with development of mobile network and information communication. But the development of network can generate serous social problems. So, it is highly required to control security of network. These problems related security will be developed and keep up to confront with anti-security part such as hacking, cracking. There's no way to preserve security from hacker or cracker without delvelopping new cryptographic algorithm or keeping the state of anti-cryptanalysis in a prescribed time by means of extendig key-length. Worldwidely, many researchers for network security are trying to handle these problems. In this paper, we proposed a new block cryptosystem. The Block cipher-Secure Electronic Xenogenesis Algorithm(B-SEXA) which is capable to cipher regardless of key distribution or key-length for these definite problem is proposed and designed in hardware. B-SEXA increase secret level from using a MDP and MLP in maximum is proposed to prevent cryptograpy analysis. The designed B-SEXA in this paper performed synthesization and simulation using Synopsys Vwe. 1999.10 and VHDL.

Keywords

References

  1. Shoji Miyaguchi, 'The FEAL cipher family', In Alfred J. Menezes and Scott A. Vanstone, editors, Advances in Crypto1ogy-Crypto'90, Vol. 537 of Lecture Notes in Computer Science, Sprmger-Verlag, Berlin, pp. 627-638, 1990
  2. Eli Biham and Adi Shamir, 'Differential cr yptanalysis of DES-like cryptosystems', Jo umal of Crypto1ogy4(1). pp. 3-72, 1991 https://doi.org/10.1007/BF00630563
  3. Kaisa Nyberg and Lars R. Knudsen, 'Provable secuhty against a differential attack', Jour nal of Cryptology S(l), PP. 27-37, 1995
  4. Mitsuru Matsui, 'Linear oyptanalysis method for DES cipher', In Tor Helleseth, editor, Advances in Crypto1ogy-Eurocrypt'93, Vol. 765 of Leture Notes in Computer Science, Springer-Verlag, Berlin, pp. 386-397, 1994
  5. R. D. Silverman, 'A cost-based Security analysis of symmetric asymmetric Ke ylengths', Bulletin 13, RSA Lab., 2000
  6. D. E. Denning, 'The data encryption stand ard : Fifteen years of public secuhty', Dist. Lecture, 6th Annual Comp. Security Appl. Conf., IEEE Comp, Soc. Press, ppx-xv , 1990
  7. A. Shimizu, S. Miyaguchi, 'Fast Data Encipherment Algorithm, FEAL', Proc. of Eurocrypt 91, 1991
  8. X. Lai, 'On the Design and Security of Block Ciphers', ETH Series in Information Processing, Vol. 1, 1992
  9. E. Biham, A. Shamir, 'Differential Cryptan alysis of Data Encryption Standard', Sprin ger-Verlag, 1993
  10. C. H. Paradimitriou, Computational Com plexity, Addison-Wesley, Reading, Massach usetts, 1994
  11. Bruce Schneider, 'Applied Cryptography, Second Edition-Protocols, Algorithms, and Souice Cbde in C', John Wiley & Sons, 1996