Results 11 to 20 of about 2,398,687 (396)

Recover plaintext attack to block ciphers [PDF]

open access: greenarXiv, 2008
we will present an estimation for the upper-bound of the amount of 16-bytes plaintexts for English texts, which indicates that the block ciphers with block length no more than 16-bytes will be subject to recover plaintext attacks in the occasions of plaintext -known or plaintext-chosen attacks.
An-Ping Li
arxiv   +3 more sources

Key classification attack on block ciphers [PDF]

open access: yesarXiv, 2013
In this paper, security analysis of block ciphers with key length greater than block length is proposed. When key length is significantly greater than block length and the statistical distribution of cipher system is like a uniform distribution, there are more than one key which map fixed input to fixed output.
Mirahmadi, Saeed   +2 more
arxiv   +4 more sources

New Methodology of Block Cipher Analysis using Chaos Game [PDF]

open access: goldITB Journal of Information and Communication Technology, 2011
Block cipher analysis covers randomness analysis and cryptanalysis. This paper proposes a new method potentially used for randomness analysis and cryptanalysis. The method uses true random sequence concept as a reference for measuring randomness level of
Budi Sulistyo   +3 more
doaj   +3 more sources

On some block ciphers and imprimitive groups [PDF]

open access: greenApplicable Algebra in Engineering, Communication and Computing, 2009
The group generated by the round functions of a block ciphers is a widely investigated problem. We identify a large class of block ciphers for which such group is easily guaranteed to be primitive. Our class includes the AES and the SERPENT.
Caranti, Andrea   +2 more
openaire   +4 more sources

Systematization of a 256-bit lightweight block cipher Marvin [PDF]

open access: yesarXiv, 2018
In a world heavily loaded by information, there is a great need for keeping specific information secure from adversaries. The rapid growth in the research field of lightweight cryptography can be seen from the list of the number of lightweight stream as well as block ciphers that has been proposed in the recent years.
Bhattacharya, Abhishek   +2 more
arxiv   +4 more sources

New mode of operation inspired by the braid of long hair [PDF]

open access: yesRevista Română de Informatică și Automatică, 2023
In cryptography, a mode of operation is the way of processing plaintext and encrypted text blocks within a block cipher algorithm, or it is the presentation of a method of chaining blocks in a block cipher.
Hana ALI-PACHA   +2 more
doaj   +1 more source

Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2023
We consider the design of a tweakable block cipher from a block cipher whose inputs and outputs are of size n bits. The main goal is to achieve 2n security with a large tweak (i.e., more than n bits). Previously, Mennink at FSE’15 and Wang et al.
Yaobin Shen, François-Xavier Standaert
doaj   +1 more source

Chaghri - A FHE-friendly Block Cipher

open access: yesConference on Computer and Communications Security, 2022
The Recent progress in practical applications of secure computation protocols has also attracted attention to the symmetric-key primitives underlying them.
T. Ashur, M. Mahzoun, Dilara Toprakhisar
semanticscholar   +1 more source

KOMBINASI CAESAR CIPHER DAN REVERSE CIPHER BERDASARKAN CIPHER BLOCK CHAINING

open access: yesMajalah Ilmiah Matematika dan Statistika, 2021
Communication in the current era of globalization is very developed. Many applications that can be used to facilitate communication. However, because of this convenience, the security of the information contained in it will be more easily hacked by ...
Maulidyah Lailatun Najah   +1 more
doaj   +1 more source

Lightweight Block Cipher Security Evaluation Based on Machine Learning Classifiers and Active S-Boxes

open access: yesIEEE Access, 2021
Machine learning has recently started to gain the attention of cryptographic researchers, notably in block cipher cryptanalysis. Most of these machine learning-based approaches are black box attacks that are cipher-specific.
Ting Rong Lee   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy