Results 31 to 40 of about 44,791 (329)

A General Analysis of the Security of Elastic Block Ciphers [PDF]

open access: yes, 2005
We analyze the security of elastic block ciphers in general to show that an attack on an elastic version of block cipher implies a polynomial time related attack on the fixed-length version of the block cipher.
Cook, Debra L.   +2 more
core   +2 more sources

On Elastic Block Ciphers and Their Differential and Linear Cryptanalyses [PDF]

open access: yes, 2005
Motivated by applications such as databases with nonuniform field lengths, we introduce the concept of an elastic block cipher, a new approach to variable length block ciphers which incorporates fixed sized cipher components into a new network structure.
Cook, Debra L.   +2 more
core   +2 more sources

An Enhancement Method Based on Modifying CFB Mode for Key Generation in AES Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2016
There are two very important characteristics in the block cipher, the amount of time for encryption process and key complexity which caused increasing the complexity of encryption process.
Hasanen S. Abdulah   +2 more
doaj   +1 more source

Quantitative Evaluation of Chaotic CBC Mode of Operation [PDF]

open access: yes, 2016
The cipher block chaining (CBC) block cipher mode of operation presents a very popular way of encrypting which is used in various applications. In previous research work, we have mathematically proven that, under some conditions, this mode of operation ...
Abidi, Abdessalem   +4 more
core   +3 more sources

Elastic Block Ciphers: Method, Security and Instantiations [PDF]

open access: yes, 2009
We introduce the concept of an elastic block cipher which refers to stretching the supported block size of a block cipher to any length up to twice the original block size while incurring a computational workload that is proportional to the block size ...
Cook, Debra L.   +2 more
core   +3 more sources

Survey and Benchmark of Block Ciphers for Wireless Sensor Networks [PDF]

open access: yes, 2006
Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without ...
Doumen, J.M., Hartel, P.H., Law, Y.W.
core   +3 more sources

Elastic block ciphers

open access: yesProceedings of the 2nd ACM symposium on Information, computer and communications security, 2007
We introduce the concept of an elastic block cipher, which refers to stretching the supported block size of a block cipher to any length up to twice the original block size while incurring a computational workload that is proportional to the block size. We define a method for converting any existing block cipher into an elastic block cipher and mention
Cook, Debra L.   +2 more
openaire   +2 more sources

Parallel Implementation of PIPO and Its Application for Format Preserving Encryption

open access: yesIEEE Access, 2022
The PIPO block cipher, a domestic lightweight block cipher, was announced at ICISC’20. In particular, the bitslicing technique is implemented in the S-Layer for the PIPO block cipher.
Hyunji Kim   +5 more
doaj   +1 more source

Enhancing Embedded Data Security By Turns Cipher Block Chaining Mode Into Stream Cipher [PDF]

open access: yesEngineering and Technology Journal, 2009
In this paper, a secure data hiding method is introduced. It increases the security of embedded data through combining between the steganography and cryptography. First, the secrete message is divided into blocks with same size according to length of key
Salah Mahdi Saleh
doaj   +1 more source

Counter Mode of the Shannon Block Cipher Based on MPF Defined over a Non-Commuting Group

open access: yesMathematics, 2022
In this paper, we present a counter mode of a Shannon block cipher based on the matrix power function. We make use of the matrix power function to define a single round symmetric cipher.
Aleksejus Mihalkovich   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy