Results 1 to 10 of about 2,410,295 (395)

The block cipher Square [PDF]

open access: bronze, 1997
In this paper we present a new 128-bit block cipher called Square. The original design of Square concentrates on the resistance against differential and linear cryptanalysis. However, after the initial design a dedicated attack was mounted that forced us to augment the number of rounds.
Joan Daemen   +2 more
openalex   +3 more sources

Iterative Block Ciphers from Tweakable Block Ciphers with Long Tweaks

open access: yesIACR Transactions on Symmetric Cryptology, 2020
We consider a problem of constructing a secure block cipher from a tweakable block cipher (TBC) with long tweaks. Given a TBC with n-bit blocks and Γn-bit tweaks for Γ ≥ 1, one of the constructions by Minematsu in DCC 2015 shows that a simple iteration ...
Ryota Nakamichi, Tetsu Iwata
doaj   +3 more sources

COUNTER MODE DEVELOPMENT FOR BLOCK CIPHER OPERATIONS [PDF]

open access: diamondمجلة جامعة الانبار للعلوم الصرفة, 2012
There are two basic types of symmetric cipher: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertext—usually of 64 bits but sometimes longer. Stream ciphers operate on streams of plaintext and ciphertext one bit or
Ali M. Sagheer, Ahmed T. Suod
doaj   +3 more sources

Dynamic Rounds Chaotic Block Cipher Based on Keyword Abstract Extraction [PDF]

open access: yesEntropy, 2018
According to the keyword abstract extraction function in the Natural Language Processing and Information Retrieval Sharing Platform (NLPIR), the design method of a dynamic rounds chaotic block cipher is presented in this paper, which takes into account ...
Juan Wang, Qun Ding
doaj   +2 more sources

On Compression of Data Encrypted with Block Ciphers [PDF]

open access: greenarXiv, 2010
This paper investigates compression of data encrypted with block ciphers, such as the Advanced Encryption Standard (AES). It is shown that such data can be feasibly compressed without knowledge of the secret key. Block ciphers operating in various chaining modes are considered and it is shown how compression can be achieved without compromising ...
Demijan Klinc   +4 more
openalex   +3 more sources

Recover plaintext attack to block ciphers [PDF]

open access: greenarXiv, 2008
we will present an estimation for the upper-bound of the amount of 16-bytes plaintexts for English texts, which indicates that the block ciphers with block length no more than 16-bytes will be subject to recover plaintext attacks in the occasions of plaintext -known or plaintext-chosen attacks.
An-Ping Li
openalex   +3 more sources

On Compression of Data Encrypted with Block Ciphers [PDF]

open access: green2009 Data Compression Conference, 2009
This paper investigates compression of data encrypted with block ciphers, such as the Advanced Encryption Standard (AES). It is shown that such data can be feasibly compressed without knowledge of the secret key. Block ciphers operating in various chaining modes are considered and it is shown how compression can be achieved without compromising ...
Demijan Klinc   +4 more
  +8 more sources

New Methodology of Block Cipher Analysis using Chaos Game [PDF]

open access: goldITB Journal of Information and Communication Technology, 2011
Block cipher analysis covers randomness analysis and cryptanalysis. This paper proposes a new method potentially used for randomness analysis and cryptanalysis. The method uses true random sequence concept as a reference for measuring randomness level of
Budi Sulistyo   +3 more
doaj   +3 more sources

On some block ciphers and imprimitive groups [PDF]

open access: greenApplicable Algebra in Engineering, Communication and Computing, 2008
The group generated by the round functions of a block ciphers is a widely investigated problem. We identify a large class of block ciphers for which such group is easily guaranteed to be primitive. Our class includes the AES and the SERPENT.
A. Caranti   +2 more
openalex   +4 more sources

New mode of operation inspired by the braid of long hair [PDF]

open access: yesRevista Română de Informatică și Automatică, 2023
In cryptography, a mode of operation is the way of processing plaintext and encrypted text blocks within a block cipher algorithm, or it is the presentation of a method of chaining blocks in a block cipher.
Hana ALI-PACHA   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy