Results 21 to 30 of about 30,889 (254)

Algebraic Cryptanalysis with MRHS Equations

open access: yesCryptography, 2023
In this work, we survey the existing research in the area of algebraic cryptanalysis based on Multiple Right-Hand Sides (MRHS) equations (MRHS cryptanalysis).
Pavol Zajac
doaj   +1 more source

Unique Aspects of Usage of the Quadratic Cryptanalysis Method to the GOST 28147-89 Encryption Algorithm

open access: yesInternational Journal of Informatics, Information System and Computer Engineering, 2022
In this article, issues related to the application of the quadratic cryptanalysis method to the five rounds of GOST 28147-89 encryption algorithm are given.
Bardosh Akhmedov, Rakhmatillo Aloev
doaj   +1 more source

Blocking Linear Cryptanalysis Attacks Found on Cryptographic Algorithms Used on Internet of Thing Based on the Novel Approaches of Using Galois Field (GF (232)) and High Irreducible Polynomials

open access: yesApplied Sciences, 2023
Attacks on the Internet of Things (IoT) are not highly considered during the design and implementation. The prioritization is making profits and supplying services to clients. Most cryptographic algorithms that are commonly used on the IoT are vulnerable
Khumbelo Difference Muthavhine   +1 more
doaj   +1 more source

Some cryptanalytic results on Lizard

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Lizard is a lightweight stream cipher proposed by Hamann, Krause and Meier in IACR ToSC 2017. It has a Grain-like structure with two state registers of size 90 and 31 bits. The cipher uses a 120-bit secret key and a 64-bit IV.
Subhadeep Banik   +3 more
doaj   +1 more source

A Binomial Crossover Based Artificial Bee Colony Algorithm for Cryptanalysis of Polyalphabetic Cipher

open access: yesTehnički Vjesnik, 2020
Cryptography is one of the common approaches to secure private data and cryptanalysis involves breaking down a coded cipher text without having the key.
Arkan Kh Shakr Sabonchi*, Bahriye Akay
doaj   +1 more source

Intelligent Techniques in Cryptanalysis: Review and Future Directions

open access: yesUHD Journal of Science and Technology, 2017
In this paper, we consider the use of some intelligent techniques such as artificial neural networks (ANNs) and genetic algorithms (GAs) in solving various cryptanalysis problems.
Sufyan T. Al-Janabi   +2 more
doaj   +1 more source

Feasibility study of genetic algorithms application for implementation of block cryptosystem cryptanalysis

open access: yesAdvanced Engineering Research, 2015
Feasibility of genetic search algorithms application for implementation of the cryptanalysis of block cipher methods is considered. A distinctive feature of the bioinspired cryptanalysis methods application (in particular, genetic methods) is the ...
Yury O. Chernyshev   +3 more
doaj   +1 more source

Differential cryptanalysis of full-round ANU-II ultra-lightweight block cipher

open access: yesInternational Journal of Distributed Sensor Networks, 2022
Lightweight ciphers are often used as the underlying encryption algorithm in resource-constrained devices. Their cryptographic security is a mandatory goal for ensuring the security of data transmission.
Ting Fan   +3 more
doaj   +1 more source

On the Cryptanalysis of a Latin Cubes-Based Image Cryptosystem

open access: yesEntropy, 2021
Based on orthogonal Latin cubes, an image cryptosystem with confusion–diffusion–confusion cipher architecture has been proposed recently (Inf. Sci.2019, 478, 1–14).
Rong Huang   +3 more
doaj   +1 more source

Cryptanalysis of Plantlet

open access: yesIACR Transactions on Symmetric Cryptology, 2019
Plantlet is a lightweight stream cipher designed by Mikhalev, Armknecht and Müller in IACR ToSC 2017. It has a Grain-like structure with two state registers of size 40 and 61 bits. In spite of this, the cipher does not seem to lose in security against generic Time-Memory-Data Tradeoff attacks due to the novelty of its design.
Banik, Subhadeep   +2 more
openaire   +5 more sources

Home - About - Disclaimer - Privacy