Results 151 to 159 of about 284 (159)
Some of the next articles are maybe not open access.

Algebraic Cryptanalysis of the Data Encryption Standard

2007
In spite of growing importance of the Advanced Encryption Standard (AES), the Data Encryption Standard (DES) is by no means obsolete. DES has never been broken from the practical point of view. The variant "triple DES" is believed very secure, is widely used, especially in the financial sector, and should remain so for many many years to come.
Nicolas T. Courtois, Gregory V. Bard
openaire   +1 more source

Algebraic Methods in Block Cipher Cryptanalysis

2009
This thesis is a contribution to the field of algebraic cryptanalysis. Specifically the following topics have been studied: We construct and analyze Feistel and SLN ciphers that have a sound design strategy against linear and differential cryptanalysis. The encryption process for these cipher can be described by very simple polynomial equations.
openaire   +1 more source

Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems

2010
Recently, the Little Dragon Two and Poly-Dragon multivariate based public-key cryptosystems were proposed as efficient and secure schemes. In particular, the inventors of the two schemes claim that Little Dragon Two and Poly-Dragon resist algebraic cryptanalysis. In this paper, we show that MXL2, an algebraic attack method based on the XL algorithm and
Johannes Buchmann   +4 more
openaire   +1 more source

Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages

2010
In this paper, we present an algebraic attack against the Flurry and Curry block ciphers [12,13]. Usually, algebraic attacks against block ciphers only require one message/ciphertext pair to be mounted. In this paper, we investigate a different approach.
Faugère, Jean-Charles, Perret, Ludovic
openaire   +1 more source

Towards Algebraic Cryptanalysis of HFE Challenge 2

2011
In this paper, we present an experimental analysis of HFE Challenge 2 (144 bit) type systems. We generate scaled versions of the full challenge fixing and guessing some unknowns. We use the MXL3 algorithm, an efficient algorithm for computing Grobner basis, to solve these scaled versions.
Mohamed Saied Emam Mohamed   +2 more
openaire   +1 more source

Algebraic and Logic Solving Methods for Cryptanalysis [PDF]

open access: possible, 2020
Algebraic solving of polynomial systems and satisfiability of propositional logic formulas are not two completely separate research areas, as it may appear at first sight. In fact, many problems coming from cryptanalysis, such as algebraic fault attacks, can be rephrased as solving a set of Boolean polynomials or as deciding the satisfiability of a ...
openaire  

Some Elementary Cryptanalysis of Algebraic Cryptography

The American Mathematical Monthly, 1961
openaire   +1 more source

Differential-Linear Cryptanalysis from an Algebraic Perspective

Journal of Cryptology
Meicheng Liu   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy