Explore chapters and articles related to this topic
Remote User Authentication Using Camellia Encryption for Network-Based Applications
Published in Amit Kumar Tyagi, Ajith Abraham, A. Kaklauskas, N. Sreenath, Gillala Rekha, Shaveta Malik, Security and Privacy-Preserving Techniques in Wireless Robotics, 2022
A. Nithishma, Aayush Vijayan, Diya Nanda, Ch. Aswani Kumar, Sumaiya Thaseen, Amir Ahmad
Encryption is an absolute necessity in modern world communications. Huge networks have a large number of devices connected to it, which increases the network’s vulnerability to attacks. This puts the user data and communications at the risk of being intercepted. Encryption is the key to ensuring safe communication and transactions. Basically, encryption takes a meaningful piece of text and turns it into something that would be useless to the unauthorized individual. There are various encryption algorithms available to us, but this chapter focuses mainly on Camellia encryption algorithms and its applications. Camellia cipher is symmetric key block cipher. The block size is 128 bits and the key sizes are variable and can be 128, 192 and 256 bits long. Camellia has either 18 rounds (for 128-bit keys) or 24 rounds (for 192- or 256-bit keys) Feistel cipher. After every six rounds of F function, the inverse of the FL-function or a logical transformation layer is applied to the FL-function. Camellia uses 4 8×8-bit S- boxes. Camellia also uses input, output key whitening. The diffusion layer in Camellia uses a linear transformation which is completely based on a matrix with a department quantity of 5. Thus, Camellia Encryption Algorithm is said to be infeasible to any brute force attacks.
Design of substitution nodes (S-Boxes) of a block cipher intended for preliminary encryption of confidential information
Published in Cogent Engineering, 2022
Ardabek Khompysh, Nursulu Kapalova, Kunbolat Algazy, Dilmukhanbet Dyusenbayev, Kairat Sakan
An S-box fulfills SAC criterion if an alteration in one bit in the input bit can cause an avalanche change in the output bits that is nearly half of the output bits must be altered. The comparison of overall SAC analysis of proposed S-box with AES and S-p-box is shown in Tables 2–4, while the average outcomes are shown in Table 5 and graphical representation of analysis comparison is describe Figure 2. It can be observed from Table 5 that the proposed S-box has attained a maximum value = 0.526, minimum value = 0.437, average value = 0.499, and square deviation = 0.0039. The average SAC values for the proposed S-box are good. These results are consistent with the avalanche effect. Table 6 shows the comparative characteristics of S-boxes of symmetric block ciphers SM4, AES (A), Kuznyechik (K), BelT (B), Camellia (C), and the proposed S-box (M). The values in Table 6 were obtained by known methods for checking the properties of S-boxes (links are given) and using a computer program developed in the laboratory and designed to study the properties of Boolean functions (Duysenbayev & Algazy, 2021).