Results 161 to 170 of about 1,200 (188)

Probabilistic Algebraic Attacks

2005
This paper investigates a probabilistic algebraic attack on LFSR-based stream ciphers. We consider two scenarios (S3a and S3b) proposed by Meier et al. at Eurocrypt 2004. In order to derive the probability in this new algebraic attack, we quantify the distance between a Boolean function and a function with annihilator of a certain degree.
Braeken, An, Preneel, Bart
openaire   +2 more sources

A new algebraic attack on DASTA

Journal of High Speed Networks, 2023
As a fully homomorphic encryption friendly symmetric-key primitive, DASTA was invented by Hebborn at Fast Software Encryption 2020. A new fixed linear layer design concept is introduced in the DASTA stream cipher so that its AND depth and the number of ANDs per encrypted bit are quite small.
Zhao, Haixia, Li, Keque, Wei, Yongzhuang
openaire   +1 more source

SMS4 Algorithm Algebra Fault Attack

2010 Third International Symposium on Electronic Commerce and Security, 2010
SMS4 algorithm packet length and key length is 128bit. This article presents a SMS4 algorithm of byte-oriented theory, algebraic fault attack only need 1 error redaction that we can recover SMS4 of 128bit key.
Hu Zhihua, Liao Xiaoyong
openaire   +1 more source

Algebraic attacks on cipher systems

2004 IEEE Africon. 7th Africon Conference in Africa (IEEE Cat. No.04CH37590), 2005
Recently, algebraic attacks have emerged as a new type of cryptographic attack on block ciphers. These attacks involve the formulation of a system of nonlinear equations that describe the secret keybits in terms of the input and output bits of the block cipher, which is then solved.
openaire   +1 more source

Hardware attacks: an algebraic approach

Journal of Cryptographic Engineering, 2016
Many VLSI chips now contain cryptographic processors to secure their data and external communications. Attackers target the hardware to imitate or understand the system design, to gain access to the system or to obtain encryption keys. They may also try to initiate attacks such as denial of service to disable the services supported by a chip, or reduce
Samer Moein   +2 more
openaire   +1 more source

Algebraic Attack on HFE Revisited

2008
In this paper, we study how the algebraic attack on the HFE multivariate public key cryptosystem works if we build an HFE cryptosystem on a finite field whose characteristic is not two. Using some very basic algebraic geometry we argue that when the characteristic is not two the algebraic attack should not be polynomial in the range of the parameters ...
Jintai Ding   +2 more
openaire   +1 more source

Algebraic Attacks on Round-Reduced Keccak

2021
Since Keccak was selected as the SHA-3 standard, both its hash mode and keyed mode have attracted lots of third-party cryptanalysis. Especially in recent years, there is progress in analyzing the collision resistance and preimage resistance of round-reduced Keccak.
Fukang Liu   +3 more
openaire   +1 more source

Simplifying algebraic attacks with univariate analysis

2011 Information Theory and Applications Workshop, 2011
The purpose of this paper is to present a more fine-grained view on cryptanalysis of stream ciphers based on LFSRs in terms of the univariate representation and to provide some connections to cyclic codes. A usual way of presenting such ciphers is in terms of multivariate equations over GF(2).
Tor Helleseth, Sondre Ronjom
openaire   +1 more source

Meeting the Attacks on Algebra

The Mathematics Teacher, 1926
No subject in the high school curriculum, according to some educators, has yielded such unsatisfactory results as Algebra. It has been the subject of most severe criticisms on all sides, and has been held responsible for a great deal of freshman mortality. A leading educator of Massachusetts, in one of his public speeches, has expressed the desire that
openaire   +1 more source

Home - About - Disclaimer - Privacy