Results 151 to 159 of about 284 (159)
Some of the next articles are maybe not open access.
Algebraic Cryptanalysis of the Data Encryption Standard
2007In spite of growing importance of the Advanced Encryption Standard (AES), the Data Encryption Standard (DES) is by no means obsolete. DES has never been broken from the practical point of view. The variant "triple DES" is believed very secure, is widely used, especially in the financial sector, and should remain so for many many years to come.
Nicolas T. Courtois, Gregory V. Bard
openaire +1 more source
Algebraic Methods in Block Cipher Cryptanalysis
2009This thesis is a contribution to the field of algebraic cryptanalysis. Specifically the following topics have been studied: We construct and analyze Feistel and SLN ciphers that have a sound design strategy against linear and differential cryptanalysis. The encryption process for these cipher can be described by very simple polynomial equations.
openaire +1 more source
Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems
2010Recently, the Little Dragon Two and Poly-Dragon multivariate based public-key cryptosystems were proposed as efficient and secure schemes. In particular, the inventors of the two schemes claim that Little Dragon Two and Poly-Dragon resist algebraic cryptanalysis. In this paper, we show that MXL2, an algebraic attack method based on the XL algorithm and
Johannes Buchmann +4 more
openaire +1 more source
Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages
2010In this paper, we present an algebraic attack against the Flurry and Curry block ciphers [12,13]. Usually, algebraic attacks against block ciphers only require one message/ciphertext pair to be mounted. In this paper, we investigate a different approach.
Faugère, Jean-Charles, Perret, Ludovic
openaire +1 more source
Towards Algebraic Cryptanalysis of HFE Challenge 2
2011In this paper, we present an experimental analysis of HFE Challenge 2 (144 bit) type systems. We generate scaled versions of the full challenge fixing and guessing some unknowns. We use the MXL3 algorithm, an efficient algorithm for computing Grobner basis, to solve these scaled versions.
Mohamed Saied Emam Mohamed +2 more
openaire +1 more source
Algebraic and Logic Solving Methods for Cryptanalysis [PDF]
Algebraic solving of polynomial systems and satisfiability of propositional logic formulas are not two completely separate research areas, as it may appear at first sight. In fact, many problems coming from cryptanalysis, such as algebraic fault attacks, can be rephrased as solving a set of Boolean polynomials or as deciding the satisfiability of a ...
openaire
Some Elementary Cryptanalysis of Algebraic Cryptography
The American Mathematical Monthly, 1961openaire +1 more source
Differential-Linear Cryptanalysis from an Algebraic Perspective
Journal of CryptologyMeicheng Liu +4 more
openaire +1 more source

