Escolar Documentos
Profissional Documentos
Cultura Documentos
2. Introduction to RC5
Encryption and Decryption is shown in the below
Figure 4.
2.
3.
4.1. Encryption:
At the start of the Cipher, the input is copied to the
State array using the conventions described in Fig.6.
4.2. Decryption:
At the start of the Decryption, the Input is copied to
the State matrix and after complete decryption State
matrix is copied back into the Output array, using the
conventions described in Fig 6. The working of DDAES is shown in Figure 15 as a Pseudo Code.
2.
AES:
1.
2.
3.
8. Future Works
1.
2.
9. Conclusion
Data Dependent AES supports variable size key
length, variable number of rounds and variable word
size. By this, the proposed algorithm provides more
flexibility. And data dependent rotations in
ShiftRows() and its Inverse removes predictability,
thus achieves more security. And its future works can
be in removing static nature of S-Box, MixColoumns
and their Inverse.
10. References
[1]. RC5 Encryption Algorithm by Ronald L Rivest,
MIT Laboratory for Computer Science
[2]. Advanced Encryption Standard (AES) Federal
Information Processing Standards Publication 197