Results 71 to 80 of about 6,520 (191)
Differential cryptanalysis and linear cryptanalysis are the two best-known cryptanalysis techniques for symmetric-key primitives. Ensuring resistance to these attacks is critical for the security of block ciphers.
Ting Peng, Wentao Zhang, Jingsui Weng
doaj +1 more source
Probability distributions of correlation and differentials in block ciphers
We study the probability distributions of difference propagation probabilities and input-output correlations for functions and block ciphers of given dimensions, for several of them for the first time.
Daemen Joan, Rijmen Vincent
doaj +1 more source
Hardware Security in the Connected World
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee +4 more
wiley +1 more source
Algebraic properties of generalized Rijndael-like ciphers [PDF]
We provide conditions under which the set of Rijndael functions considered as permutations of the state space and based on operations of the finite field $\GF (p^k)$ ($p\geq 2$ a prime number) is not closed under functional composition.
B. Scott +5 more
core
ABSTRACT With the increasing reliance on the Internet of Things devices in various fields, especially in smart homes or smart factories, concerns are increasing about cyber threats targeting intrusion detection systems that protect Internet of Things (IoT) networks.
Zaed S. Mahdi +2 more
wiley +1 more source
MILP-Based Differential Cryptanalysis on Round-Reduced Midori64
Mixed integer linear programming (MILP) model was presented by Sun et al. at Asiacrypt 2014 to search for differential characteristics of block ciphers. Based on this model, it is easy to assess block ciphers against differential attack.
Hongluan Zhao +3 more
doaj +1 more source
Abstract This paper introduces a novel lightweight colour image encryption algorithm, specifically designed for resource‐constrained environments such as Internet of Things (IoT) devices. As IoT systems become increasingly prevalent, secure and efficient data transmission becomes crucial.
Kenan İnce, Cemile İnce, Davut Hanbay
wiley +1 more source
XSL Block Ciphers’ Key-schedules with Resistance to Differential Cryptanalysis
The paper discusses the resistance of XSL block ciphers to differential cryptanalysis. AES-like block ciphers with alternative key-schedules (increased performance and density) are given as an example.
Marina Aleksandrovna Pudovkina +1 more
doaj
Distinguishing Attack on NORX Permutation
NORX is a permutation-based authentication scheme which is currently a third-round candidate of the ongoing CAESAR competition. The security bound of NORX is derived from the sponge construction applied to an ideal underlying permutation.
Tao Huang, Hongjun Wu
doaj +1 more source
New Experimental Results in Differential — Linear Cryptanalysis of Reduced Variants of DES [PDF]
At the beginning of the paper we give an overview of the linear and differential cryptanalysis of block ciphers. We describe two extensions of linear cryptanalysis (analysis with multiple expressions [7] and differentiallinear cryptanalysis [10] which form the basis of the conducted experiments.
Anna Górska +4 more
openaire +1 more source

