Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
C

Cryptogrpahy

@Cryptogrpahy
About
Posts
38
Topics
14
Shares
0
Groups
0
Followers
0
Following
0

Posts

Recent Best Controversial

  • Justification is requested. please help me resolve this problem. Phd and Prof
    C Cryptogrpahy

    What you said over can be satisfied as proper test?

    Algorithms algorithms security help database question

  • Justification is requested. please help me resolve this problem. Phd and Prof
    C Cryptogrpahy

    If the encryption scheme works on only numbers, especially limited inside 32 bits input, then how to test it properly?

    Algorithms algorithms security help database question

  • Justification is requested. please help me resolve this problem. Phd and Prof
    C Cryptogrpahy

    A little bit clarify about NIST random test suite please? If the scheme used it for generator as a random generator function in class of java programming language then what need to do? It is already proven random generator?

    Algorithms algorithms security help database question

  • Justification is requested. please help me resolve this problem. Phd and Prof
    C Cryptogrpahy

    It is really needed me to proof my little cryptographic scheme because of i have used an own created cryptographic scheme to make secure for the mobile data transaction in a database system, and our lectures, who are professional on this cryptography, said "If it is used any created cryptographic algorithm to make secure for something then it would be done for proper cryptanalysis to prove that the algorithm is not hackable and to proof strength of algorithm first then it is possible to say as secure model. Otherwise it is not considered as secure. I have heard about that cryptographic scheme is built after the mathematic justification is done but it is already done for programing implementation before the mathematic justification on the scheme/algorithm is done because of that time i had no idea about that all. If it is needed to rebuilt the scheme/algorithm again, it really hard for me to restart new one. Cryptographic algorithm metric literature (1997), I've found, suggested about a few important metrics such as type, functions, key size, rounds, complexity, attack and strength but If it is new modern metric came out ready, i have not found it yet. It is really needed justification on the proper cryptanalysis to prove that the scheme/algorithm is not hackable and to proof strength of algorithm as well General detail of the algorithm follows as listed below. Type: Symmetric Functions: Confidentiality and authentication Key size: 256 bit Round: 3 Complexity: encryption, decryption and key setup include the expansion, bit operations, modular multiplications and modular exponentiations. Attack: have not started to test it yet. Strength: not started. Additional info encryption and decryption schemes work on numbers only because of data transaction in the database system uses numbers (not text and any other symbols) Encryption Input: 32 bits Output: 128 bits what need to do is better? If Any body, who are Phd, Prof and experts on the cryptography and were doing this before, please advice me? Thank you

    Algorithms algorithms security help database question

  • Need suggestion
    C Cryptogrpahy

    The s-box in cryptography is named like Substitution box (a.k.a substitution table).

    Design and Architecture question

  • Need suggestion on the S-box.
    C Cryptogrpahy

    How can i make good s-box easily (against linear and differential attacks)? If i used prepaid one that may belongs to someone or standard ciphers then it would be plagiarism right? So i need to make own s-box (8 bit input, 8 bit output (16x16)). Please Please suggest me any way to decide it. Thank you.

    Algorithms question

  • Need suggestion
    C Cryptogrpahy

    How can i make good s-box easily (against linear and differential attacks)? If i used prepaid one that may belongs to someone or standard ciphers then it would be plagiarism right? So i need to make own s-box (8 bit input, 8 bit output (16x16)). Please Please suggest me any way to decide it. Thank you.

    Design and Architecture question

  • Skipjack and RC5
    C Cryptogrpahy

    Where can find these (Skipjack and RC5) ciphers latest materials such as international paper, book or reference. I saw some of them but they published around 10 years ago. That is too old to use. Is this any new materials for them? Help to find it? Thank you

    Design and Architecture help question learning

  • Process time of the Skipjack and RC5 [modified]
    C Cryptogrpahy

    Well. It seems like you've never been tried process time for any impl in java before. You may have theory and a bit pro.skill. If you tried and had idea, you would be said another instruction.X| Process may show different time at practice from the time at theory and time at talking. Yes, it can't be lost the cryptographic security issue that is explained by algorithm strength metric.

    Algorithms java security question career learning

  • Process time of the Skipjack and RC5 [modified]
    C Cryptogrpahy

    Acctually, I'm doing comparison between 5 algorithms in the java imp. The comparison value at the RC5 is too shorter than others (DES, 3DES, Skipjack and Mine "new" ). If you know about RC5 and DES code below , please take a look on the source codes of them. Comeplete resource. RC5test.java ----------------------------RC5test.java--------------------------------- // RC5 demo worker thread. import java.math.BigInteger; import java.security.SecureRandom; import java.util.*; class RC5test { public static void main(String[] args) { RC5test aaa = new RC5test(); aaa.runa(); } public void runa() { SecureRandom random = new SecureRandom(); // cyphertext and iv data from the RSA test pseudo-contest "RSA-32/12/8-test" BigInteger pt1 = new BigInteger(32, random); long txt; RC5 rc5 = new RC5_32_12_8(); byte[] key = new byte[rc5.keySize()]; // uncommenting these lines gives the correct key, we'll just start searching close to it key[0] = (byte)0x82; key[1] = (byte)0xe5; key[2] = (byte)0x1b; key[3] = (byte)0x9f; key[4] = (byte)0x9c; key[5] = (byte)0xc7; key[6] = (byte)0x18; key[7] = (byte)0xf9; long stime, fdetime, detime, entime, fentime; stime = fdetime = detime = entime = fentime = 0; Random r = new Random(); long pt = (long)r.nextInt(); long cipher = 0; int i =0; for(i = 0; i<1000; i++){ stime = System.nanoTime(); rc5.setup(key); cipher = rc5.encrypt(pt); entime = System.nanoTime() - stime; System.out.println("Encryption Cipher: " +String.valueOf(cipher)); stime = System.nanoTime(); txt = rc5.decrypt(cipher);// ^ iv; detime = System.nanoTime() - stime; System.out.println("Decryption Cipher: " +String.valueOf(txt)); System.out.println(""); fdetime += detime; //System.out.println("Decryption: " +String.valueOf(detime)); fentime += entime; //System.out.println("Encryption: " +String.valueOf(entime)); } System.out.println("encrypt time: " + fentime/1000 + "ns"); System.out.println("decrypt time: " + fdetime/1000 + "ns"); System.out.println("run for: " + i + " times"); //Host.updateStats(keys, end - start, true); } } ----------------------------------------end of the RC5test--------------------------------------- RC5_32_12_8.java ---------------------------------------RC5_32_12_8.java------------------------------------------ // RC5-32/12/8 imple

    Algorithms java security question career learning

  • Process time of the Skipjack and RC5 [modified]
    C Cryptogrpahy

    java implemenation of the RC5 is too faster. Someone measured RC5 java.imp before? Here, process time of the RC5 encryption and decryption are almost expressed as 5 or 4 digits of the number in nanosecond. So someone tried it before? or saw any book, references on this job? I need the references for the RC5 java imp. Look it process time here: DES: enc - 804172 n.s dec - 442647 n.s RC5: enc - 13904 n.s dec - 3783 n.s

    modified on Monday, April 7, 2008 5:31 AM

    Algorithms java security question career learning

  • Process time of the Skipjack and RC5
    C Cryptogrpahy

    Yes. i will do them as soon. I have tried implementation in java by DES and 3DES before. The enc/dec process speed of them were slower than implementation in any C prog language. if any one did imp. in java for the AES previous time, please show me the result of the process speed by n.s? DES enc: 804172 dec: 442647 3DES enc: 1604512 dec: 1214572 Maybe if someone tried them, please write process time here to compare it them. I think the time is defenced on your computer hardware also.

    Algorithms java question

  • Process time of the Skipjack and RC5
    C Cryptogrpahy

    Any one has measured the process time of the Skipjack and RC5 in java implementation by n.s before?

    Algorithms java question

  • Where can i find the simulation program for AES
    C Cryptogrpahy

    Ok. Sounds interesting that you always do simulation. I think maybe you can advice me about right or wrong way for my preferring simulation. If i follow explaining simulation below then is that correct way for my simulation? My algorithm is a stream algorithm and focused only on the numbers ?/input one byte/, /output 128 bytes/. Process of between input and output is around 4 to 8 rounds. Each round includes substitute, shift and inversion operations that work on the series of the input bytes. My algorithm is focused on the binary numbers only. This is why I don't want that my simulation is not like many standard simulations. I just want to make my simulation between mine and AES by certian criteria such as encryption and decryption time, key randomness, length of the key and design of the algorithm. If i get simulation results from that comparisons then it can be right simulation? Thank you. Knowledge is the perception of the agreement or disagreement of two ideas John Locke

    Algorithms help

  • Where can i find the simulation program for AES
    C Cryptogrpahy

    Thanks for your leaving suggestion. I told about no more ability at the programing previous time but if it had no choice then i would be faced to get someone has my coding for my simulation prog. Short time, maybe i can't make myself to coding for my simulation. thank you

    Algorithms help

  • Where can i find the simulation program for AES
    C Cryptogrpahy

    Simulation program, which is a program for to simulate with other similar models, looks like most operations inside model displays on the screen and It can show what process is going on the model by showing numbers, result or graphics. I can handle the simple AES coding easily. But the problem is that coding is not for simulation, that is only simple coding. I'm not so good ability at the coding. If simple makes into the coding then i can't simulate with others without taken measuring value of the operations inside and outside. If somebody knows about simulation program for AES, please help? The person, who are not sure,Please check this site out http://islab.oregonstate.edu/koc/ece575/03Project/Held-Zier/ and take the some idea about simulation from the demo program. Thnks

    Algorithms help

  • Where can i find the simulation program for AES
    C Cryptogrpahy

    Simulation program, which is a program for to simulate with other similar models, looks like most operations inside model displays on the screen and It can show what process is going on the model by showing numbers, result or graphics. I can handle the simple AES coding easily. But the problem is that coding is not for simulation, that is only simple coding. I'm not so good ability at the coding. If simple makes into the coding then i can't simulate with others without taken measuring value of the operations inside and outside. If somebody knows about simulation program for AES, please help? The person, who are not sure,Please check this site out and take the some idea about simulation from the demo program. Thnks

    Algorithms help

  • Where can i find the simulation program for AES
    C Cryptogrpahy

    Hi El Corazon Yeah that has a link of the simulation prog there. That prog is only demo version. I put that link in previous message for other to know about that. If you have any idea about simulation for AES, please share me your idea. I need to simulate my prog. Still looking for the simulation prog of the AES. Thank you Choices can result in failure, even if our intentions are good.

    Algorithms help

  • Where can i find the simulation program for AES
    C Cryptogrpahy

    Thanks for your answering Skippums The AES is common knowing algorithm nowadays. I'm looking for the simulation program for the AES only. The simulation program which is a real AES program that shows some operations' results inside AES on the screen. First, I need to compare between encryption time of the AES for certian data and encryption time for my algorithm for same certian data with AES aslo. Second, I need to check the randomness of the key generator. Third the check the....., Fourth...... Therefore i'm looking for the simulation AES program. Maybe anybody knows about that, please help? you can get idea about simulation program from here. http://islab.oregonstate.edu/koc/ece575/03Project/Held-Zier/ You are important person. Thank you.

    Algorithms help

  • Where can i find the simulation program for AES
    C Cryptogrpahy

    If anybody knows about that simulation program, Please help me to find AES simulation program. Thank you.

    Algorithms help
  • Login

  • Don't have an account? Register

  • Login or register to search.
  • First post
    Last post
0
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups