Results 11 to 20 of about 1,151 (262)
Iterative Block Ciphers from Tweakable Block Ciphers with Long Tweaks
We consider a problem of constructing a secure block cipher from a tweakable block cipher (TBC) with long tweaks. Given a TBC with n-bit blocks and Γn-bit tweaks for Γ ≥ 1, one of the constructions by Minematsu in DCC 2015 shows that a simple iteration ...
Ryota Nakamichi, Tetsu Iwata
doaj +3 more sources
BLOCK CIPHER PERFORMANCE AND RISK ANALYSIS [PDF]
Block cipher algorithms are a very important issue in the field of information security. Their simple structure and software-based encryption allow users to implement them in several applications such as: data security and cloud computing. In this paper,
amina Alregabo, Yassin Hikmat Ismael
doaj +1 more source
Validity of Differential Characteristics of ARX Block Ciphers
In this paper, we examine the validity of the differential characteristics of ARX-based block ciphers. Recently, Peyrin et al. showed that some of the differential characteristics of block ciphers, SKINNY and GIFT, in the literature are not valid ...
Dongyoung Roh
doaj +1 more source
Provably Quantum-Secure Tweakable Block Ciphers
Recent results on quantum cryptanalysis show that some symmetric key schemes can be broken in polynomial time even if they are proven to be secure in the classical setting.
Akinori Hosoyamada, Tetsu Iwata
doaj +1 more source
Identification on the structures of block ciphers using machine learning
Cryptographic identification is a critical aspect of cryptanalysis and a fundamental premise for key recovery.With the advancement of artificial intelligence, cryptanalysis based on machine learning has become increasingly mature, providing more ...
Ruiqi XIA, Manman LI, Shaozhen CHEN
doaj +3 more sources
Efficient Implementation of PRESENT and GIFT on Quantum Computers
Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key ...
Kyungbae Jang +5 more
doaj +1 more source
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Liskov, Moses +2 more
openaire +4 more sources
COUNTER MODE DEVELOPMENT FOR BLOCK CIPHER OPERATIONS [PDF]
There are two basic types of symmetric cipher: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertext—usually of 64 bits but sometimes longer. Stream ciphers operate on streams of plaintext and ciphertext one bit or
Ali M. Sagheer, Ahmed T. Suod
doaj +1 more source
Counter Mode Development for Block Cipher Operations [PDF]
There are two basic types of symmetric algorithms: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertext—usually of 64 bits but sometimes longer.
Ali Sagheer
doaj +1 more source
With the advent of the Internet of Things (IoT) and cloud computing technologies, vast amounts of data are being created and communicated in IoT networks. Block ciphers are being used to protect these data from malicious attacks.
Hyunjun Kim +4 more
doaj +1 more source

