Results 21 to 30 of about 2,414,614 (286)

How to distinguish between a block cipher and a random permutation by lowering the input entropy [PDF]

open access: yes, 2001
IEEE 35th International Carnahan Conference on Security Technology. Londres, 16-19 October 2001A novel cryptanalysis technique is presented, and its suitability for distinguishing a block cipher algorithm or a hash function from a random permutation is ...
González-Tablas, Ana Isabel   +3 more
core   +3 more sources

Block cipher four implementation on field programmable gate array

open access: yesCommunications in Science and Technology, 2020
Block ciphers are used to protect data in information systems from being leaked to unauthorized people. One of many block cipher algorithms developed by Indonesian researchers is the BCF (Block Cipher-Four) - a block cipher with 128-bit input/output that
Yusuf Kurniawan, Muhammad Adli Rizqulloh
doaj   +1 more source

Designing pair of nonlinear components of a block cipher over quaternion integers

open access: yesAIMS Mathematics, 2023
In the field of cryptography, block ciphers are widely used to provide confidentiality and integrity of data. One of the key components of a block cipher is its nonlinear substitution function.
Muhammad Sajjad   +3 more
doaj   +1 more source

A General Analysis of the Security of Elastic Block Ciphers [PDF]

open access: yes, 2005
We analyze the security of elastic block ciphers in general to show that an attack on an elastic version of block cipher implies a polynomial time related attack on the fixed-length version of the block cipher.
Cook, Debra L.   +2 more
core   +2 more sources

Counter Mode Development for Block Cipher Operations [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2009
There are two basic types of symmetric algorithms: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertext—usually of 64 bits but sometimes longer.
Ali Sagheer
doaj   +1 more source

On Elastic Block Ciphers and Their Differential and Linear Cryptanalyses [PDF]

open access: yes, 2005
Motivated by applications such as databases with nonuniform field lengths, we introduce the concept of an elastic block cipher, a new approach to variable length block ciphers which incorporates fixed sized cipher components into a new network structure.
Cook, Debra L.   +2 more
core   +2 more sources

New Constructions of MACs from (Tweakable) Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2017
We propose new constructions of Message Authentication Codes (MACs) from tweakable or conventional block ciphers. Our new schemes are either stateless and deterministic, nonce-based, or randomized, and provably secure either in the standard model for ...
Benoît Cogliati   +2 more
doaj   +1 more source

Elastic Block Ciphers: Method, Security and Instantiations [PDF]

open access: yes, 2009
We introduce the concept of an elastic block cipher which refers to stretching the supported block size of a block cipher to any length up to twice the original block size while incurring a computational workload that is proportional to the block size ...
Cook, Debra L.   +2 more
core   +3 more sources

Quantitative Evaluation of Chaotic CBC Mode of Operation [PDF]

open access: yes, 2016
The cipher block chaining (CBC) block cipher mode of operation presents a very popular way of encrypting which is used in various applications. In previous research work, we have mathematically proven that, under some conditions, this mode of operation ...
Abidi, Abdessalem   +4 more
core   +3 more sources

On the Design of Secure and Fast Double Block Length Hash Functions [PDF]

open access: yes, 2008
In this work the security of the rate-1 double block length hash functions, which based on a block cipher with a block length of n-bit and a key length of 2n-bit, is reconsidered.
Chen, Kefei, Gong, Z., Lai, X.J.
core   +11 more sources

Home - About - Disclaimer - Privacy