Results 11 to 20 of about 1,151 (262)

Iterative Block Ciphers from Tweakable Block Ciphers with Long Tweaks

open access: yesIACR Transactions on Symmetric Cryptology, 2020
We consider a problem of constructing a secure block cipher from a tweakable block cipher (TBC) with long tweaks. Given a TBC with n-bit blocks and Γn-bit tweaks for Γ ≥ 1, one of the constructions by Minematsu in DCC 2015 shows that a simple iteration ...
Ryota Nakamichi, Tetsu Iwata
doaj   +3 more sources

BLOCK CIPHER PERFORMANCE AND RISK ANALYSIS [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2023
Block cipher algorithms are a very important issue in the field of information security. Their simple structure and software-based encryption allow users to implement them in several applications such as: data security and cloud computing. In this paper,
amina Alregabo, Yassin Hikmat Ismael
doaj   +1 more source

Validity of Differential Characteristics of ARX Block Ciphers

open access: yesIEEE Access, 2023
In this paper, we examine the validity of the differential characteristics of ARX-based block ciphers. Recently, Peyrin et al. showed that some of the differential characteristics of block ciphers, SKINNY and GIFT, in the literature are not valid ...
Dongyoung Roh
doaj   +1 more source

Provably Quantum-Secure Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2021
Recent results on quantum cryptanalysis show that some symmetric key schemes can be broken in polynomial time even if they are proven to be secure in the classical setting.
Akinori Hosoyamada, Tetsu Iwata
doaj   +1 more source

Identification on the structures of block ciphers using machine learning

open access: yes网络与信息安全学报, 2023
Cryptographic identification is a critical aspect of cryptanalysis and a fundamental premise for key recovery.With the advancement of artificial intelligence, cryptanalysis based on machine learning has become increasingly mature, providing more ...
Ruiqi XIA, Manman LI, Shaozhen CHEN
doaj   +3 more sources

Efficient Implementation of PRESENT and GIFT on Quantum Computers

open access: yesApplied Sciences, 2021
Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key ...
Kyungbae Jang   +5 more
doaj   +1 more source

Tweakable Block Ciphers [PDF]

open access: yesJournal of Cryptology, 2002
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Liskov, Moses   +2 more
openaire   +4 more sources

COUNTER MODE DEVELOPMENT FOR BLOCK CIPHER OPERATIONS [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2012
There are two basic types of symmetric cipher: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertext—usually of 64 bits but sometimes longer. Stream ciphers operate on streams of plaintext and ciphertext one bit or
Ali M. Sagheer, Ahmed T. Suod
doaj   +1 more source

Counter Mode Development for Block Cipher Operations [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2009
There are two basic types of symmetric algorithms: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertext—usually of 64 bits but sometimes longer.
Ali Sagheer
doaj   +1 more source

Secure and Robust Internet of Things with High-Speed Implementation of PRESENT and GIFT Block Ciphers on GPU

open access: yesApplied Sciences, 2022
With the advent of the Internet of Things (IoT) and cloud computing technologies, vast amounts of data are being created and communicated in IoT networks. Block ciphers are being used to protect these data from malicious attacks.
Hyunjun Kim    +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy