Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Aalanche properties and randomness of the Twofish cipher
Download
index.pdf
Date
2004
Author
El, Ömer
Metadata
Show full item record
Item Usage Stats
207
views
77
downloads
Cite This
In this thesis, one finalist cipher of the Advanced Encryption Standard (AES) block cipher contest, Twofish proposed by Schneier et al, is studied in order to observe the validity of the statement made by Arikan about the randomness of the cipher, which contradicts National Institute of Standards and Technology (NIST)̕s results. The strength of the cipher to cryptanalytic attacks is investigated by measuring its randomness according to the avalanche criterion. The avalanche criterion results are compared with those of the Statistical Test Suite of the NIST and discrepancies in the second and third rounds are explained theoretically.
Subject Keywords
Electronics.
URI
http://etd.lib.metu.edu.tr/upload/12605571/index.pdf
https://hdl.handle.net/11511/14917
Collections
Graduate School of Natural and Applied Sciences, Thesis
Suggestions
OpenMETU
Core
Design and systemc implementation of a crypto processor for AES and DES algorithms
Egemen, Tufan; Aşkar, Murat; Department of Electrical and Electronics Engineering (2007)
This thesis study presents design and SystemC implementation of a Crypto Processor for Advanced Encryption Standard (AES), Data Encryption Standard (DES) and Triple DES (TDES) algorithms. All of the algorithms are implemented in single architecture instead of using separate architectures for each of the algorithm. There is an Instruction Set Architecture (ISA) implemented for this Crypto Processor and the encryption and decryption of algorithms can be performed by using the proper instructions in the ISA. A...
Evaluation of multi target tracking algorithms in the presence of clutter
Güner, Onur; Kuzuoğlu, Mustafa; Department of Electrical and Electronics Engineering (2005)
This thesis describes the theoretical bases, implementation and testing of a multi target tracking approach in radar applications. The main concern in this thesis is the evaluation of the performance of tracking algorithms in the presence of false alarms due to clutter. Multi target tracking algorithms are composed of three main parts: track initiation, data association and estimation. Two methods are proposed for track initiation in this work. First one is the track score function followed by a threshold c...
The effect of design patterns on object-oriented metrics and software error-proneness
Aydınöz, Barış; Bilgen, Semih; Department of Electrical and Electronics Engineering (2006)
This thesis study investigates the connection between design patterns, OO metrics and software error-proneness. The literature on OO metrics, design patterns and software error-proneness is reviewed. Different software projects and synthetic source codes have been analyzed to verify this connection.
Reliability improvement of RF MEMS devices based on lifetime measurements
Gürbüz, Ozan Doğan; Demir, Şimşek; Akın, Tayfun; Department of Electrical and Electronics Engineering (2010)
This thesis presents fabrication of shunt, capacitive contact type RF MEMS switches which are designed according to given mm-wave performance specifications. The designed switches are modified for investigation in terms of reliability and lifetime. To observe the real-time performance of switches a time domain measurement setup is established and a CV (capacitance vs. voltage) curve measurement system is also included to measure CV curves, pull-in and hold-down voltages and the shifts of these due to actuat...
Design and FPGA implementation of hash processor
Şiltu, Çelebi Tuğba; Aşkar, Murat; Department of Electrical and Electronics Engineering (2007)
In this thesis, an FPGA based hash processor is designed and implemented using a hardware description language; VHDL. Hash functions are among the most important cryptographic primitives and used in the several fields of communication integrity and signature authentication. These functions are used to obtain a fixed-size fingerprint or hash value of an arbitrary long message. The hash functions SHA-1 and SHA2-256 are examined in order to find the common instructions to implement them using same hardware blo...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
Ö. El, “Aalanche properties and randomness of the Twofish cipher,” M.S. - Master of Science, Middle East Technical University, 2004.