Show simple item record

dc.rights.licensehttp://creativecommons.org/licenses/by-nc-sa/3.0/ve/
dc.contributor.authorCastañeda Marín, Hernandoes_VE
dc.contributor.authorRodríguez Graterol, Wladimires_VE
dc.date2006-08-09es_VE
dc.date.accessioned2006-08-09T09:00:00Z
dc.date.available2006-08-09T09:00:00Z
dc.date.created2005-10-10es_VE
dc.date.issued2006-08-09T09:00:00Zes_VE
dc.identifier.otherT016300002533/0es_VE
dc.identifier.urihttp://www.saber.ula.ve/handle/123456789/15862
dc.description.abstractConstrucción de un cifrador basado en una permutación pseudo-aleatoria (Castañeda Marín, Hernando y Rodríguez Graterol, Wladimir) Abstract The purpose of this paper is the analysis and development of as practical implementation of a cipher based on the schema proposed by Even and Mansour[1]. The schema corresponds to a block cipher based in the use of a permutation in the encryption operation and in the corresponding inverse function for the decryption process. The key K that consist in two sub keys K1 and K2, which are produce by means of a pseudorandom numbers generator with unpredictable inputs and pseudorandom output sequences. To measure the reliability of the permutation of the resulting sequence of the previous XOR operation, hypothesis test were done using the statistic X2 for different combinations of the { 0,1 } patterns referenced in those sequences. In order to reach this purpose the Yarrow-160, a visual C++ software from Counterpane System, computational tool was used; extended with the necessary encryption and decryption routines for the proposed cryptosystem based on the Even and Mansour schema. Also a routine was added, that allows doing statistical test by determining the computed values of X2 for the different combinatorial patterns of the sequences. This work is an academicals practice to test the strengths and debilities of the Counterpane System software and allows to extend it by means of the construction of a cipher based on a simple permutation that, as practical implementation allows the test of its computational complexity and security. The realization of a cryptanalysis and the realization of different cryptographic attacks will made possible future works in the field of cryptographic and computational security. Ponencia dictada en: XXXI Conferencia Latinoamericana de Informática - CLEI2005. Cali-Colombia, del 10 al 14 de octubre de 2005.es_VE
dc.format.extent202836es_VE
dc.language.isoeses_VE
dc.publisherSABER ULAes_VE
dc.rightsinfo:eu-repo/semantics/openAccess
dc.subjectSeguridades_VE
dc.subjectCriptografíaes_VE
dc.subjectSistemas de comunicaciónes_VE
dc.titleConstrucción de un cifrador basado en una permutación pseudo-aleatoriaes_VE
dc.typeinfo:eu-repo/semantics/article
dc.description.emailhcastaneda@ula.ve, hcastaneda@unipamplona.edu.coes_VE
dc.description.emailwladimir@ula.vees_VE
dc.description.tiponivelNivel monográficoes_VE
dc.subject.Mots-clesCiencias Computacionaleses_VE
dc.subject.Mots-clesIngenieríaes_VE
dc.subject.dependenciaDoctorado en Ciencias Aplicadases_VE
dc.subject.facultadFacultad de Ingenieríaes_VE
dc.subject.keywordsCryptographices_VE
dc.subject.keywordsComputational securityes_VE
dc.subject.tipoArtículoses_VE


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record