Results 121 to 130 of about 30,889 (254)
Distributed computations are considered as a tool of cryptanalysis. It is shown that time of implementation of “meet in the middle of attack” method using distributed computations designed for cryptanalysis of some class of iterative symmetric block ...
V. M. Fomichev
doaj
Using Bernstein-Vazirani Algorithm to Attack Block Ciphers [PDF]
In this paper, we study applications of Bernstein-Vazirani algorithm and present several new methods to attack block ciphers. Specifically, we first present a quantum algorithm for finding the linear structures of a function. Based on it, we propose new quantum distinguishers for the 3-round Feistel scheme and a new quantum algorithm to recover partial
arxiv
Grain [11] is a lightweight stream cipher proposed by M. Hell, T. Johansson, and W. Meier to the eSTREAM call for stream cipher proposals of the European project ECRYPT [5]. Its 160-bit internal state is divided into a LFSR and an NFSR of length 80 bits each. A filtering boolean function is used to derive each keystream bit from the internal state.
Côme Berbain+2 more
openaire +2 more sources
According to the research works of the literatures on chaotic cryptanalysis, many recent chaotic image encryption algorithms cannot resist chosen-plaintext attack.
Wei Feng+3 more
doaj +1 more source
Zero-Correlation Linear Cryptanalysis of Reduced Round ARIA with Partial-sum and FFT [PDF]
Block cipher ARIA was first proposed by some South Korean experts in 2003, and later, it was established as a Korean Standard block cipher algorithm by Korean Agency for Technology and Standards. In this paper, we focus on the security evaluation of ARIA block cipher against the recent zero-correlation linear cryptanalysis.
arxiv
Hacking of the AES with Boolean Functions [PDF]
One of the major issues of cryptography is the cryptanalysis of cipher algorithms. Cryptanalysis is the study of methods for obtaining the meaning of encrypted information, without access to the secret information that is normally required. Some mechanisms for breaking codes include differential cryptanalysis, advanced statistics and brute-force ...
arxiv
Quantifying Shannon's Work Function for Cryptanalytic Attacks
Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures.
van Son, R. J. J. H.
core +1 more source
Cryptanalysis of the Ajtai-Dwork cryptosystem [PDF]
P.H. Nguyen, Jacques Stern
openalex +1 more source
Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis [PDF]
Howard M. Heys, S.E. Tavares
openalex +1 more source