Results 41 to 50 of about 30,889 (254)

On the security of the Yen-Guo's domino signal encryption algorithm (DSEA) [PDF]

open access: yes, 2006
Recently, a new domino signal encryption algorithm (DSEA) was proposed for digital signal transmission, especially for digital images and videos. This paper analyzes the security of DSEA, and points out the following weaknesses: 1) its security against ...
Chengqing Li   +7 more
core   +2 more sources

Cryptanalysis of Draco

open access: yesIACR Transactions on Symmetric Cryptology, 2022
Draco is a lightweight stream cipher designed by Hamann et al. in IACR ToSC 2022. It has a Grain-like structure with two state registers of size 95 and 33 bits. In addition, the cipher uses a 128-bit secret key and a 96-bit IV. The first 32 bits of the key and the IV forms a non-volatile internal state that does not change during the time that the ...
openaire   +3 more sources

Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2017
This paper serves as a systematization of knowledge of linear cryptanalysis and provides novel insights in the areas of key schedule design and tweakable block ciphers.
Thorsten Kranz   +2 more
doaj   +1 more source

Cryptanalysis of three matrix-based key establishment protocols [PDF]

open access: yes, 2011
We cryptanalyse a matrix-based key transport protocol due to Baumslag, Camps, Fine, Rosenberger and Xu from 2006. We also cryptanalyse two recently proposed matrix-based key agreement protocols, due to Habeeb, Kahrobaei and Shpilrain, and due to ...
Blackburn, Simon R.   +2 more
core   +4 more sources

Cryptanalysis of NBC-128

open access: yesDianzi Jishu Yingyong, 2021
NBC is a family of block ciphers using Generalized Feistel structure, designed by Xu Hong et al. There are three block and key sizes,i.e.,128/128, 128/256 and 256/256. A 16-bit Sbox is involved in the cipher as the non-linear component.
Yang Jiangshuai   +3 more
doaj   +1 more source

Short expressions of permutations as products and cryptanalysis of the Algebraic Eraser [PDF]

open access: yes, 2012
On March 2004, Anshel, Anshel, Goldfeld, and Lemieux introduced the \emph{Algebraic Eraser} scheme for key agreement over an insecure channel, using a novel hybrid of infinite and finite noncommutative groups. They also introduced the \emph{Colored Burau
Anshel   +16 more
core   +2 more sources

Cryptanalysis Knapsack Cipher Using Artificial Immune System [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2009
In this work, the use of an artificial immune system (AIS ) in  cryptanalysis  is explored. This AIS uses the clonal selection principle for the cryptanalysis of knapsack cipher.
Eman Al-Obaidy
doaj   +1 more source

Survey on approaches of stream cipher cryptanalysis

open access: yesTongxin xuebao, 2022
Cryptanalysis plays an essential role in the design of ciphers algorithm.Based on this, the common approaches were reviewed and investigated to clarify their relations.These approaches were categorized into four classes according to their main techniques,
Zhaocun ZHOU, Dengguo FENG
doaj   +2 more sources

Hardware Implementation of Algorithm for Cryptanalysis [PDF]

open access: yesInternational Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013, 2013
Cryptanalysis of block ciphers involves massive computations which are independent of each other and can be instantiated simultaneously so that the solution space is explored at a faster rate. With the advent of low cost Field Programmable Gate Arrays, building special purpose hardware for computationally intensive applications has now become possible.
arxiv   +1 more source

Software system of cryptanalysis using impossible differentials method based on parallel programming technologies OpenMP and MPI [PDF]

open access: yes, 2013
Програма, яка розробляється в даному проекті, призначена для проведення криптоаналізу методом неможливих диференціалів блокового симетричного шифру AES, а саме – над елементами раунду.The program is being developed in this project is designed for ...
Novak, Nazarii   +1 more
core  

Home - About - Disclaimer - Privacy