Results 101 to 110 of about 30,889 (254)
Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM
In this work, we focus on LS-design ciphers Fantomas, Robin, and iSCREAM. LS-designs are a family of bitslice ciphers aimed at efficient masked implementations against side-channel analysis.
Ashutosh Dhar Dwivedi+3 more
doaj +1 more source
New method of colour image encryption using triple chaotic maps
Initially, the plain image is decomposed into the RGB format. An individual chaotic map is used in the permutation and diffusion of each map to break the correlations in the plain image. Lorenz, 2D‐Logistic, and Henon maps are used in different orders and with different orders of channels, producing a cipher image with the properties of randomness and ...
Khalid M. Hosny+5 more
wiley +1 more source
In this paper we examine the redesign of LOKI, LOKI91 proposed by Brown et al. First it is shown that there is no characteristic with a probability high enough to do a successful differential attack on LOKI91. Secondly we show that the size of the image of the F-function in LOKI91 is 8\22*2^32.
openaire +3 more sources
Cryptanalysis of SDES via evolutionary computation techniques [PDF]
The cryptanalysis of simplified data encryption standard can be formulated as NP-Hard combinatorial problem. The goal of this paper is two fold. First we want to make a study about how evolutionary computation techniques can efficiently solve the NP-Hard combinatorial problem.
arxiv
Cryptanalysis of dynamic look-up table based chaotic cryptosystems [PDF]
In recent years many chaotic cryptosystems based on Baptista's seminal work have been proposed. We analyze the security of two of the newest and most interesting ones, which use a dynamically updated look-up table and also work as stream ciphers. We provide different attack techniques to recover the keystream used by the algorithms.
arxiv +1 more source
Abstract Clinical pharmacology is often the nexus in any cross‐disciplinary team that is seeking solutions for human healthcare issues. The use and application of real‐world data and artificial intelligence to better understand our ecosystem has influenced our view at the world and how we do things.
Tirhani Maluleke+13 more
wiley +1 more source
Quantum impossible differential and truncated differential cryptanalysis [PDF]
Traditional cryptography is suffering a huge threat from the development of quantum computing. While many currently used public-key cryptosystems would be broken by Shor's algorithm, the effect of quantum computing on symmetric ones is still unclear. The security of symmetric ciphers relies heavily on the development of cryptanalytic tools.
arxiv
Cryptolysis v.0.0.1 - A Framework for Automated Cryptanalysis of Classical Ciphers [PDF]
Cryptolysis is a framework that includes a collection of automated attacks on the classical ciphers based on the article by Clark Dawson on Optimisation heuristics for the automated cryptanalysis of classical ciphers from the Journal of Combinatorial Mathematics and Combinatorial Computing, 1998.
arxiv +1 more source
<p>In 1990 Brown, Pieprzyk and Seberry proposed a new encryption primitive, which encrypts and decrypts a 64-bit block of data using a 64-bit key. Furthermore they propose a way to build private versions of LOKI.</p><p>In this paper we show first that the keyspace of any LOKI-version is only 2^60, not 2^64 as claimed.
openaire +4 more sources
Towards Exploring Fundamental Limits of System-Specific Cryptanalysis Within Limited Attack Classes: Application to ABSG [PDF]
A new approach on cryptanalysis is proposed where the goal is to explore the fundamental limits of a specific class of attacks against a particular cryptosystem. As a first step, the approach is applied on ABSG, which is an LFSR-based stream cipher where irregular decimation techniques are utilized.
arxiv