Results 1 to 10 of about 2,414,614 (286)
New Methodology of Block Cipher Analysis using Chaos Game [PDF]
Block cipher analysis covers randomness analysis and cryptanalysis. This paper proposes a new method potentially used for randomness analysis and cryptanalysis. The method uses true random sequence concept as a reference for measuring randomness level of
Budi Sulistyo +3 more
doaj +3 more sources
Survey of Lightweight Block Cipher [PDF]
With the rapid development of information technology,human beings are entering the era of ubiquitous connectivity,where billions of Internet of Things(IoT) devices are connected to the network.The continuous growth of network attacks targeting user ...
ZHONG Yue, GU Jieming, CAO Honglin
doaj +1 more source
New mode of operation inspired by the braid of long hair [PDF]
In cryptography, a mode of operation is the way of processing plaintext and encrypted text blocks within a block cipher algorithm, or it is the presentation of a method of chaining blocks in a block cipher.
Hana ALI-PACHA +2 more
doaj +1 more source
Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers
We consider the design of a tweakable block cipher from a block cipher whose inputs and outputs are of size n bits. The main goal is to achieve 2n security with a large tweak (i.e., more than n bits). Previously, Mennink at FSE’15 and Wang et al.
Yaobin Shen, François-Xavier Standaert
doaj +1 more source
Time-based One-Time Password Scheme for PLC [PDF]
To solve the problem that existing Time-based One-Time Password(TOTP) schemes cannot run efficiently on Programmable Logic Controller(PLC), a TOTP scheme called BC-TOTP is proposed based on block cipher.
BAO Zhiting, KE Junming, YANG Zheng, LONG Hua, HUANG Dong
doaj +1 more source
Machine learning has recently started to gain the attention of cryptographic researchers, notably in block cipher cryptanalysis. Most of these machine learning-based approaches are black box attacks that are cipher-specific.
Ting Rong Lee +4 more
doaj +1 more source
KOMBINASI CAESAR CIPHER DAN REVERSE CIPHER BERDASARKAN CIPHER BLOCK CHAINING
Communication in the current era of globalization is very developed. Many applications that can be used to facilitate communication. However, because of this convenience, the security of the information contained in it will be more easily hacked by ...
Maulidyah Lailatun Najah +1 more
doaj +1 more source
Proposal of New Block Cipher Algorithm [PDF]
Speed and complexity are two important properties in the block cipher.The block length of the block cipher controls these two aspects. The speedlimitation enforces the designer to build block cipher system as hardwareprototype.
Hilal Hadi Salih +2 more
doaj +1 more source
Matrix Power Function Based Block Cipher Operating in CBC Mode
In our previous study, we proposed a perfectly secure Shannon cipher based on the so-called matrix power function. There we also introduced a concept of single round symmetric encryption, i.e., we used the matrix power function together with some rather ...
Lina Dindiene +3 more
doaj +1 more source
COUNTER MODE DEVELOPMENT FOR BLOCK CIPHER OPERATIONS [PDF]
There are two basic types of symmetric cipher: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertext—usually of 64 bits but sometimes longer. Stream ciphers operate on streams of plaintext and ciphertext one bit or
Ali M. Sagheer, Ahmed T. Suod
doaj +1 more source

