Results 1 to 10 of about 33,779 (275)
Deep-Learning-Based Cryptanalysis of Lightweight Block Ciphers Revisited [PDF]
With the development of artificial intelligence, deep-learning-based cryptanalysis has been actively studied. There are many cryptanalysis techniques.
Hyunji Kim +6 more
doaj +3 more sources
Cryptanalysis of an Image Encryption Algorithm Using DNA Coding and Chaos [PDF]
In recent years, many chaotic image encryption algorithms have been cracked by chosen plaintext attack. Therefore, the method of associating the key with the plaintext to resist the cryptanalysis has received extensive attention from designers.
Yuzhuo Zhao, Qiqin Shi, Qun Ding
doaj +2 more sources
Cryptanalysis of three matrix-based key establishment protocols [PDF]
We cryptanalyse a matrix-based key transport protocol due to Baumslag, Camps, Fine, Rosenberger and Xu from 2006. We also cryptanalyse two recently proposed matrix-based key agreement protocols, due to Habeeb, Kahrobaei and Shpilrain, and due to ...
Blackburn, Simon R. +2 more
core +5 more sources
AbstractRahman and Shpilrain proposed a Diffie–Hellman style key exchange based on a semidirect product ofn×nn\times n-matrices over a finite field. We show that, using public information, an adversary can recover the agreed upon secret key by solving a system ofn2{n}^{2}linear equations.
Brown Daniel R. L. +2 more
openaire +3 more sources
Comparison Between Algebraic Cryptanalysis on DES and NTRU
Algebraic cryptanalysis is a cryptanalysis method that aims to exploit the algebraic structure of an encryption algorithm to obtain the secret key. Algebraic cryptanalysis becomes interesting because it uses a small amount of known plaintext, which in ...
Fadila Paradise, Kiki Ariyanti Sugeng
doaj +1 more source
Differential-linear cryptanalysis of PRINCE cipher
PRINCE is a low-latency lightweight block cipher, which is widely used in a lot of resource constrained devices. It is based on the FX construction and the core component is PRINCEcore.
LIU Zhengbin
doaj +3 more sources
Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK
Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment.
Sugio Nobuyuki
doaj +1 more source
On the resistance of new lightweight block ciphers against differential cryptanalysis
Many recently proposed lightweight block ciphers lack security evaluation against generic cryptanalytic attacks such as differential cryptanalysis. In this paper, we contribute towards security evaluation efforts by investigating four lightweight Feistel-
Yen Yee Chan +5 more
doaj +1 more source
RETURN-MAP CRYPTANALYSIS REVISITED [PDF]
As a powerful cryptanalysis tool, the method of return-map attacks can be used to extract secret messages masked by chaos in secure communication schemes. Recently, a simple defensive mechanism was presented to enhance the security of chaotic parameter modulation schemes against return-map attacks. Two techniques are combined in the proposed defensive
Li, SJ, Chen, G, Álvarez, G
openaire +4 more sources
Algebraic Cryptanalysis with MRHS Equations
In this work, we survey the existing research in the area of algebraic cryptanalysis based on Multiple Right-Hand Sides (MRHS) equations (MRHS cryptanalysis).
Pavol Zajac
doaj +1 more source

