Results 31 to 40 of about 44,791 (329)
A General Analysis of the Security of Elastic Block Ciphers [PDF]
We analyze the security of elastic block ciphers in general to show that an attack on an elastic version of block cipher implies a polynomial time related attack on the fixed-length version of the block cipher.
Cook, Debra L. +2 more
core +2 more sources
On Elastic Block Ciphers and Their Differential and Linear Cryptanalyses [PDF]
Motivated by applications such as databases with nonuniform field lengths, we introduce the concept of an elastic block cipher, a new approach to variable length block ciphers which incorporates fixed sized cipher components into a new network structure.
Cook, Debra L. +2 more
core +2 more sources
An Enhancement Method Based on Modifying CFB Mode for Key Generation in AES Algorithm [PDF]
There are two very important characteristics in the block cipher, the amount of time for encryption process and key complexity which caused increasing the complexity of encryption process.
Hasanen S. Abdulah +2 more
doaj +1 more source
Quantitative Evaluation of Chaotic CBC Mode of Operation [PDF]
The cipher block chaining (CBC) block cipher mode of operation presents a very popular way of encrypting which is used in various applications. In previous research work, we have mathematically proven that, under some conditions, this mode of operation ...
Abidi, Abdessalem +4 more
core +3 more sources
Elastic Block Ciphers: Method, Security and Instantiations [PDF]
We introduce the concept of an elastic block cipher which refers to stretching the supported block size of a block cipher to any length up to twice the original block size while incurring a computational workload that is proportional to the block size ...
Cook, Debra L. +2 more
core +3 more sources
Survey and Benchmark of Block Ciphers for Wireless Sensor Networks [PDF]
Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without ...
Doumen, J.M., Hartel, P.H., Law, Y.W.
core +3 more sources
We introduce the concept of an elastic block cipher, which refers to stretching the supported block size of a block cipher to any length up to twice the original block size while incurring a computational workload that is proportional to the block size. We define a method for converting any existing block cipher into an elastic block cipher and mention
Cook, Debra L. +2 more
openaire +2 more sources
Parallel Implementation of PIPO and Its Application for Format Preserving Encryption
The PIPO block cipher, a domestic lightweight block cipher, was announced at ICISC’20. In particular, the bitslicing technique is implemented in the S-Layer for the PIPO block cipher.
Hyunji Kim +5 more
doaj +1 more source
Enhancing Embedded Data Security By Turns Cipher Block Chaining Mode Into Stream Cipher [PDF]
In this paper, a secure data hiding method is introduced. It increases the security of embedded data through combining between the steganography and cryptography. First, the secrete message is divided into blocks with same size according to length of key
Salah Mahdi Saleh
doaj +1 more source
Counter Mode of the Shannon Block Cipher Based on MPF Defined over a Non-Commuting Group
In this paper, we present a counter mode of a Shannon block cipher based on the matrix power function. We make use of the matrix power function to define a single round symmetric cipher.
Aleksejus Mihalkovich +2 more
doaj +1 more source

