Results 121 to 130 of about 30,889 (254)

About Method “Meet in Middle of Attack” for Cryptanalysis of Block Ciphers by means of Distributed Computations

open access: yesБезопасность информационных технологий, 2011
Distributed computations are considered as a tool of cryptanalysis. It is shown that time of implementation of “meet in the middle of attack” method using distributed computations designed for cryptanalysis of some class of iterative symmetric block ...
V. M. Fomichev
doaj  

Using Bernstein-Vazirani Algorithm to Attack Block Ciphers [PDF]

open access: yesarXiv, 2017
In this paper, we study applications of Bernstein-Vazirani algorithm and present several new methods to attack block ciphers. Specifically, we first present a quantum algorithm for finding the linear structures of a function. Based on it, we propose new quantum distinguishers for the 3-round Feistel scheme and a new quantum algorithm to recover partial
arxiv  

Cryptanalysis of Grain [PDF]

open access: yes, 2006
Grain [11] is a lightweight stream cipher proposed by M. Hell, T. Johansson, and W. Meier to the eSTREAM call for stream cipher proposals of the European project ECRYPT [5]. Its 160-bit internal state is divided into a LFSR and an NFSR of length 80 bits each. A filtering boolean function is used to derive each keystream bit from the internal state.
Côme Berbain   +2 more
openaire   +2 more sources

A Plain-Image-Related Chaotic Image Encryption Algorithm Based on DNA Sequence Operation and Discrete Logarithm

open access: yesIEEE Access, 2019
According to the research works of the literatures on chaotic cryptanalysis, many recent chaotic image encryption algorithms cannot resist chosen-plaintext attack.
Wei Feng   +3 more
doaj   +1 more source

Zero-Correlation Linear Cryptanalysis of Reduced Round ARIA with Partial-sum and FFT [PDF]

open access: yesarXiv, 2014
Block cipher ARIA was first proposed by some South Korean experts in 2003, and later, it was established as a Korean Standard block cipher algorithm by Korean Agency for Technology and Standards. In this paper, we focus on the security evaluation of ARIA block cipher against the recent zero-correlation linear cryptanalysis.
arxiv  

Hacking of the AES with Boolean Functions [PDF]

open access: yesarXiv, 2016
One of the major issues of cryptography is the cryptanalysis of cipher algorithms. Cryptanalysis is the study of methods for obtaining the meaning of encrypted information, without access to the secret information that is normally required. Some mechanisms for breaking codes include differential cryptanalysis, advanced statistics and brute-force ...
arxiv  

Quantifying Shannon's Work Function for Cryptanalytic Attacks

open access: yes, 2010
Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures.
van Son, R. J. J. H.
core   +1 more source

Partitioning cryptanalysis [PDF]

open access: bronze, 1997
Carlo Harpes, James L. Massey
openalex   +1 more source

Home - About - Disclaimer - Privacy