Results 41 to 50 of about 2,395 (159)
In this paper we present a new 128-bit block cipher called Square. The original design of Square concentrates on the resistance against differential and linear cryptanalysis. However, after the initial design a dedicated attack was mounted that forced us to augment the number of rounds.
Daemen, J., Knudsen, L., Rijmen, Vincent
openaire +2 more sources
Statistical assessment – as a part of security assessment applied to a block cipher [PDF]
The security provided by the block cipher algorithms is a top modern approached issue within the specific researches. The security assessment of a block algorithm involves the assessing and testing of components, the statistical testing of algorithm and ...
Ioana Roxana Dragomir, Marilena Lazăr
doaj
New Methodology of Block Cipher Analysis Using Chaos Game
Block cipher analysis covers randomness analysis and cryptanalysis. This paper proposes a new method potentially used for randomness analysis and cryptanalysis.
Budi Sulistyo +3 more
doaj
CRITERIA FOR MARKOV BLOCK CIPHERS
Summary: We study probabilistic models of block ciphers with random independent identically distributed round keys. We call they Markov ciphers if sequence of round differentials is a simple homogeneous Markov chain. Criteria and sufficient condition for this property are adjusted and generalized.
openaire +1 more source
In this paper, we propose a new symmetric key block cipher SC2000 with 128-bit block length and 128-,192-,256- bit key lengths. The block cipher is constructed by piling two layers: one is a Feistel structure layer and the other is an SPN structure layer. Each operation used in two layers is S-box or logical operation, which has been well studied about
Takeshi Shimoyama +7 more
openaire +1 more source
Cryptanalysis of QTL Block Cipher
QTL is an ultra-lightweight block cipher designed for extremely constrained devices. The cipher has two versions, QLT-64 and QTL-128 supporting key lengths of 64 and 128 bits, respectively. In this paper, we present the first third party cryptanalysis of QTL. We first introduce related key distinguishers for full versions of the cipher.
Coban, Mustafa +2 more
openaire +2 more sources
Elastic Block Ciphers: The Feistel Cipher Case
We discuss the elastic versions of block ciphers whose round function processes subsets of bits from the data block differently, such as occurs in a Feistel network and in MISTY1. We focus on how specific bits are selected to be swapped after each round when forming the elastic version, using an elastic version of MISTY1 and differential cryptanalysis ...
Cook, Debra L. +2 more
openaire +2 more sources
Secure Image Encryption Using Chaotic, Hybrid Chaotic and Block Cipher Approach. [PDF]
Chaudhary N, Shahi TB, Neupane A.
europepmc +1 more source
A block cipher algorithm identification scheme based on hybrid k-nearest neighbor and random forest algorithm. [PDF]
Yuan K +5 more
europepmc +1 more source
The "one-group-one-cipher" cryptograph of block-cipher based on chaotic
The"one-group-one-cipher"algorithm used the sequence from chaotic mapping as sub-key for block cipher was presented to solve the problem of weak keys existing in currently combined cipher algorithms.The randomness of abstracted key sequence was validated
XUAN Lei1, YAN Ji-ning1
doaj +2 more sources

