Short Non-Malleable Codes from Related-Key Secure Block Ciphers, Revisited
We construct non-malleable codes in the split-state model with codeword length m + 3λ or m + 5λ, where m is the message size and λ is the security parameter, depending on how conservative one is. Our scheme is very simple and involves a single call to a
Gianluca Brian +3 more
doaj +1 more source
Working Mode Recognition for SM4 Algorithm Based on Transformer [PDF]
Cipher algorithm recognition is a prerequisite for cryptanalysis and supervision of cryptographic equipment. Based on the summary and analyses of existing cipher algorithm recognition schemes, this study uses the K-Nearest Neighbor(KNN) algorithm and a ...
Yaping CHI, Ziyan YUE, Yuheng LIN
doaj +1 more source
Parallel Implementations of ARIA on ARM Processors and Graphics Processing Unit
The ARIA block cipher algorithm is Korean standard, IETF standard (RFC 5794), and part of the TLS/SSL protocol. In this paper, we present the parallel implementation of ARIA block cipher on ARMv8 processors and GPU.
Siwoo Eum +5 more
doaj +1 more source
How to distinguish between a block cipher and a random permutation by lowering the input entropy [PDF]
IEEE 35th International Carnahan Conference on Security Technology. Londres, 16-19 October 2001A novel cryptanalysis technique is presented, and its suitability for distinguishing a block cipher algorithm or a hash function from a random permutation is ...
González-Tablas, Ana Isabel +3 more
core +3 more sources
Block cipher four implementation on field programmable gate array
Block ciphers are used to protect data in information systems from being leaked to unauthorized people. One of many block cipher algorithms developed by Indonesian researchers is the BCF (Block Cipher-Four) - a block cipher with 128-bit input/output that
Yusuf Kurniawan, Muhammad Adli Rizqulloh
doaj +1 more source
A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal +2 more
core +2 more sources
Cryptanalysis of a chaotic block cipher with external key and its improved version [PDF]
Recently, Pareek et al. proposed a symmetric key block cipher using multiple one-dimensional chaotic maps. This paper reports some new findings on the security problems of this kind of chaotic cipher: 1) a number of weak keys exists; 2) some important ...
Alvarez +12 more
core +2 more sources
New Constructions of MACs from (Tweakable) Block Ciphers
We propose new constructions of Message Authentication Codes (MACs) from tweakable or conventional block ciphers. Our new schemes are either stateless and deterministic, nonce-based, or randomized, and provably secure either in the standard model for ...
Benoît Cogliati +2 more
doaj +1 more source
Counter Mode Development for Block Cipher Operations [PDF]
There are two basic types of symmetric algorithms: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertext—usually of 64 bits but sometimes longer.
Ali Sagheer
doaj +1 more source
High-Speed Fault Attack Resistant Implementation of PIPO Block Cipher on ARM Cortex-A
In ICISC’20 conference, PIPO (Plug-In and Plug-Out) was proposed as an efficient block cipher for secure communication in IoT (Internet of Things) environment.
Jingyo Song +2 more
doaj +1 more source

