Modifications of key schedule algorithm on RECTANGLE block cipher

AA Zakaria, AH Azni, F Ridzuan, NH Zakaria… - Advances in Cyber …, 2021 - Springer
Key schedule algorithm is one of the core elements that significantly affect the security of an
encryption algorithm. While its importance is undeniable, the key schedule algorithm has not …

New observation on the key schedule of RECTANGLE

H Yan, Y Luo, M Chen, X Lai - Science China Information Sciences, 2019 - Springer
We evaluate the security of RECTANGLE from the perspective of actual key information
(AKI). Insufficient AKI permits the attackers to deduce some subkey bits from some other …

An enhanced key schedule algorithm of PRESENT-128 block cipher for random and non-random secret keys

M Imdad, SN Ramli, H Mahdin - Symmetry, 2022 - mdpi.com
The key schedule algorithm (KSA) is a crucial element of symmetric block ciphers with a
direct security impact. Despite its undeniable significance, the KSA is still a less focused …

On the Key Schedule of Lightweight Block Cipher

SG Garba, AA Obiniyi, MA Ibrahim… - 2022 5th Information …, 2022 - ieeexplore.ieee.org
The key schedule, an essential part of the cipher (cryptography), is often neglected during
the cipher algorithm design. However, a compromised key schedule leads to the entire …

[PDF][PDF] Randomness analysis on RECTANGLE block cipher

AA Zakaria, AH Azni, F Ridzuan, NH Zakaria… - Cryptol. Inf. Secur …, 2020 - mscr.org.my
In this paper, we analyze the randomness of the RECTANGLE cipher. RECTANGLE is a
lightweight block cipher with 64-bit block size and variants key lengths of 80 and 128 bits …

Deep learning based analysis of key scheduling algorithm of PRESENT cipher

M Pareek, G Mishra, V Kohli - Cryptology ePrint Archive, 2020 - eprint.iacr.org
The lightweight block cipher PRESENT has become viable for areas like IoT (Internet of
Things) and RFID tags, due to its compact design and low power consumption, while …

The new approach of Rijndael key schedule

S Sulaiman, Z Muda, J Juremi - Proceedings Title: 2012 …, 2012 - ieeexplore.ieee.org
The key schedule function in Rijndael block cipher did not receive the same amount of
attention during design as the cipher components. Based on our research, there are several …

Design and analysis of key scheduling algorithm for symmetric cipher security

V Tiwari, US Kameswari, A Singh, A Saxena - International Journal of …, 2024 - Springer
The success and safety of block cipher systems heavily depend on how efficient and secure
their Key Schedule Algorithms (KSAs) are, especially when fighting against cryptanalytic …

A Modified Split-Radix Architecture-Based Key Scheduling Technique for Lightweight Block Ciphers

S Rana, M Abul Kashem - International Journal Of Computing …, 2021 - journals.uob.edu.bh
In this paper, a new key scheduling technique termed MSBK is proposed that introduces the
split-radix butterfly architecture of fast Fourier transformation (FFT) in the area of …

[PDF][PDF] Key schedule algorithm using 3-dimensional hybrid cubes for block cipher

MF Mushtaq, S Jamel, SRB Megat… - … Journal of Advanced …, 2019 - researchgate.net
A key scheduling algorithm is the mechanism that generates and schedules all session-keys
for the encryption and decryption process. The key space of conventional key schedule …