Results 1 to 10 of about 33,779 (275)

Deep-Learning-Based Cryptanalysis of Lightweight Block Ciphers Revisited [PDF]

open access: yesEntropy, 2023
With the development of artificial intelligence, deep-learning-based cryptanalysis has been actively studied. There are many cryptanalysis techniques.
Hyunji Kim   +6 more
doaj   +3 more sources

Cryptanalysis of an Image Encryption Algorithm Using DNA Coding and Chaos [PDF]

open access: yesEntropy
In recent years, many chaotic image encryption algorithms have been cracked by chosen plaintext attack. Therefore, the method of associating the key with the plaintext to resist the cryptanalysis has received extensive attention from designers.
Yuzhuo Zhao, Qiqin Shi, Qun Ding
doaj   +2 more sources

Cryptanalysis of three matrix-based key establishment protocols [PDF]

open access: hybrid, 2011
We cryptanalyse a matrix-based key transport protocol due to Baumslag, Camps, Fine, Rosenberger and Xu from 2006. We also cryptanalyse two recently proposed matrix-based key agreement protocols, due to Habeeb, Kahrobaei and Shpilrain, and due to ...
Blackburn, Simon R.   +2 more
core   +5 more sources

Cryptanalysis of “MAKE” [PDF]

open access: yesJournal of Mathematical Cryptology, 2022
AbstractRahman and Shpilrain proposed a Diffie–Hellman style key exchange based on a semidirect product ofn×nn\times n-matrices over a finite field. We show that, using public information, an adversary can recover the agreed upon secret key by solving a system ofn2{n}^{2}linear equations.
Brown Daniel R. L.   +2 more
openaire   +3 more sources

Comparison Between Algebraic Cryptanalysis on DES and NTRU

open access: yesInPrime, 2023
Algebraic cryptanalysis is a cryptanalysis method that aims to exploit the algebraic structure of an encryption algorithm to obtain the secret key. Algebraic cryptanalysis becomes interesting because it uses a small amount of known plaintext, which in ...
Fadila Paradise, Kiki Ariyanti Sugeng
doaj   +1 more source

Differential-linear cryptanalysis of PRINCE cipher

open access: yes网络与信息安全学报, 2021
PRINCE is a low-latency lightweight block cipher, which is widely used in a lot of resource constrained devices. It is based on the FX construction and the core component is PRINCEcore.
LIU Zhengbin
doaj   +3 more sources

Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK

open access: yesIET Information Security, 2023
Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment.
Sugio Nobuyuki
doaj   +1 more source

On the resistance of new lightweight block ciphers against differential cryptanalysis

open access: yesHeliyon, 2023
Many recently proposed lightweight block ciphers lack security evaluation against generic cryptanalytic attacks such as differential cryptanalysis. In this paper, we contribute towards security evaluation efforts by investigating four lightweight Feistel-
Yen Yee Chan   +5 more
doaj   +1 more source

RETURN-MAP CRYPTANALYSIS REVISITED [PDF]

open access: yesInternational Journal of Bifurcation and Chaos, 2006
As a powerful cryptanalysis tool, the method of return-map attacks can be used to extract secret messages masked by chaos in secure communication schemes. Recently, a simple defensive mechanism was presented to enhance the security of chaotic parameter modulation schemes against return-map attacks. Two techniques are combined in the proposed defensive
Li, SJ, Chen, G, Álvarez, G
openaire   +4 more sources

Algebraic Cryptanalysis with MRHS Equations

open access: yesCryptography, 2023
In this work, we survey the existing research in the area of algebraic cryptanalysis based on Multiple Right-Hand Sides (MRHS) equations (MRHS cryptanalysis).
Pavol Zajac
doaj   +1 more source

Home - About - Disclaimer - Privacy