Back to Search Start Over

Developing the Complexity and Security of the Twofish Algorithm Through a New Key Scheduling Design.

Authors :
Hattab, Anwar Abbas
Saieed, Ali Hussein
Source :
Iraqi Journal of Science. 2023, Vol. 64 Issue 11, p5923-5939. 17p.
Publication Year :
2023

Abstract

The Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Two-fish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make each explicit block a new key that differs from block to block, gaining protection against attacks. Finally, this algorithm works almost like a One-Time Pad. [ABSTRACT FROM AUTHOR]

Subjects

Subjects :
*BLOCK ciphers
*ALGORITHMS
*CIPHERS

Details

Language :
English
ISSN :
00672904
Volume :
64
Issue :
11
Database :
Academic Search Index
Journal :
Iraqi Journal of Science
Publication Type :
Academic Journal
Accession number :
174755363
Full Text :
https://doi.org/10.24996/ijs.2023.64.11.37