Skodras, "An FPGA implementation and performance evaluation of the seed
block cipher," in Proceedings of the 2011 17th International Conference on Digital Signal Processing (DSP), pp.
In the Simeck family
block cipher key schedule, Figure 2 shows the Simeck family
block cipher key schedule as a block diagram.
The combination of cluster key and fault diagnosis routing with
block cipher based encryption scheme ensures complete security, which means that the cluster member private key does not reveal the signer's identity but everyone can verify its validity.
Aref, "Biclique Cryptanalysis of the Full-Round KLEIN
Block Cipher," Iet Information Security, Vol.
Key schedule algorithm is an important part of any
block cipher algorithm and its strength directly affects the security of the cipher.
recommendation for the triple data encryption algorithm (tdea)
block cipher. 2012.
The suggested method basically adopted a 128-bit
block cipher. Of course, since a low-powered PHD, or biosensor, has a limitation in computation capability or memory, depending on application, it may use an encrypted algorithm which is less than 128 bits.
There are many disadvantages of
block cipher such as it is easy to insert or delete blocks.
proposed a symmetric key
block cipher algorithm which includes a step that simulates ideas from the processes of transcription (transfer from DNA to mRNA) and translation (from mRNA into amino acids) [13].
[35] National Institute of Standards Technology, "NIST Special Publication 800-38A: Recommendation for
Block Cipher Modes of Operation--Methods and Techniques," December 2001.