Hardware Implementation of the Stone Metamorphic Cipher

Download Now
Provided by: International Journal of Computer Science and Communication Security (IJCSCS)
Topic: Security
Format: PDF
The stone cipher is a metamorphic cipher that uses a variable word size and variable-size user's key. The cipher employs two basic functions; the encryption function and a Pseudo Random number Generator (PRG) that is based on a specially-developed one-way hash function. Four bit-balanced operations are pseudo-randomly selected to generate the sequence of operations constituting the cipher. These operations are: XOR, INV, ROR, NOP for bitwise xor, invert, rotate right and no operation respectively. The user key is encrypted using the cipher encryption function with agreed-upon initial values then it is used to generate the bit stream required to select these operations.
Download Now

Find By Topic