Aalanche properties and randomness of the Twofish cipher

Download
2004
El, Ömer
In this thesis, one finalist cipher of the Advanced Encryption Standard (AES) block cipher contest, Twofish proposed by Schneier et al, is studied in order to observe the validity of the statement made by Arikan about the randomness of the cipher, which contradicts National Institute of Standards and Technology (NIST)̕s results. The strength of the cipher to cryptanalytic attacks is investigated by measuring its randomness according to the avalanche criterion. The avalanche criterion results are compared with those of the Statistical Test Suite of the NIST and discrepancies in the second and third rounds are explained theoretically.

Suggestions

Design and systemc implementation of a crypto processor for AES and DES algorithms
Egemen, Tufan; Aşkar, Murat; Department of Electrical and Electronics Engineering (2007)
This thesis study presents design and SystemC implementation of a Crypto Processor for Advanced Encryption Standard (AES), Data Encryption Standard (DES) and Triple DES (TDES) algorithms. All of the algorithms are implemented in single architecture instead of using separate architectures for each of the algorithm. There is an Instruction Set Architecture (ISA) implemented for this Crypto Processor and the encryption and decryption of algorithms can be performed by using the proper instructions in the ISA. A...
Evaluation of multi target tracking algorithms in the presence of clutter
Güner, Onur; Kuzuoğlu, Mustafa; Department of Electrical and Electronics Engineering (2005)
This thesis describes the theoretical bases, implementation and testing of a multi target tracking approach in radar applications. The main concern in this thesis is the evaluation of the performance of tracking algorithms in the presence of false alarms due to clutter. Multi target tracking algorithms are composed of three main parts: track initiation, data association and estimation. Two methods are proposed for track initiation in this work. First one is the track score function followed by a threshold c...
The effect of design patterns on object-oriented metrics and software error-proneness
Aydınöz, Barış; Bilgen, Semih; Department of Electrical and Electronics Engineering (2006)
This thesis study investigates the connection between design patterns, OO metrics and software error-proneness. The literature on OO metrics, design patterns and software error-proneness is reviewed. Different software projects and synthetic source codes have been analyzed to verify this connection.
Reliability improvement of RF MEMS devices based on lifetime measurements
Gürbüz, Ozan Doğan; Demir, Şimşek; Akın, Tayfun; Department of Electrical and Electronics Engineering (2010)
This thesis presents fabrication of shunt, capacitive contact type RF MEMS switches which are designed according to given mm-wave performance specifications. The designed switches are modified for investigation in terms of reliability and lifetime. To observe the real-time performance of switches a time domain measurement setup is established and a CV (capacitance vs. voltage) curve measurement system is also included to measure CV curves, pull-in and hold-down voltages and the shifts of these due to actuat...
Design and FPGA implementation of hash processor
Şiltu, Çelebi Tuğba; Aşkar, Murat; Department of Electrical and Electronics Engineering (2007)
In this thesis, an FPGA based hash processor is designed and implemented using a hardware description language; VHDL. Hash functions are among the most important cryptographic primitives and used in the several fields of communication integrity and signature authentication. These functions are used to obtain a fixed-size fingerprint or hash value of an arbitrary long message. The hash functions SHA-1 and SHA2-256 are examined in order to find the common instructions to implement them using same hardware blo...
Citation Formats
Ö. El, “Aalanche properties and randomness of the Twofish cipher,” M.S. - Master of Science, Middle East Technical University, 2004.