Results 21 to 30 of about 406,684 (268)
A Differential Cryptanalysis of Yen-Chen-Wu Multimedia Cryptography System (MCS) [PDF]
At ISCAS'2005, Yen et al. presented a new chaos-based cryptosystem for multimedia transmission named "Multimedia Cryptography System" (MCS). No cryptanalytic results have been reported so far. This paper presents a differential attack to break MCS, which
Kyamakya, Kyandoghere +3 more
core +1 more source
Provable Security Against a Differential Attack
The purpose of this paper is to show that there exist DES-like iterated ciphers, which are provably resistant against differential attacks. The main result on the security of a DES-like cipher with independent round keys is Theorem 1, which gives an upper bound to the probability of <em>s</em>-round differentials, as defined in <em> ...
Nyberg, Kaisa, Knudsen, Lars Ramkilde
openaire +2 more sources
Chosen Plaintext Combined Attack against SM4 Algorithm
The SM4 algorithm is widely used to ensure the security of data transmission. The traditional chosen plaintext power attacks against SM4 usually need to analyze four rounds power traces in turn to recover the secret key.
Jintao Rao, Zhe Cui
doaj +1 more source
Internal collision attack on Maraca [PDF]
We present an internal collision attack against the new hash function Maraca which has been submitted to the SHA-3 competition. This attack requires 2^{237} calls to the round function and its complexity is lower than the complexity of the generic ...
Canteaut, Anne, Naya-Plasencia, Maria
core +1 more source
Differential Fault Attack on LEA [PDF]
LEA is a symmetric block cipher proposed in 2014. It uses ARX design and its main advantage is the possibility of a fast software implementation on common computing platforms.
Jap, Dirmanto, Breier, Jakub
openaire +2 more sources
Based on the stability theory of nonlinear differential equation, this paper analyzes the stability of the evolutionary game supply chain, and obtains the strategies that both sides should adopt in different situations.
Huiqun Yuan +3 more
doaj +1 more source
Addendum to Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives
In ToSC 2021(2), Sun et al. implemented an automatic search with the Boolean satisfiability problem (SAT) method on GIFT-128 and identified a 19-round linear approximation with the expected linear potential being 2−117.43, which is utilised to launch a ...
Ling Sun, Wei Wang, Meiqin Wang
doaj +1 more source
Doubly Perfect Nonlinear Boolean Permutations
Due to implementation constraints the XOR operation is widely used in order to combine plaintext and key bit-strings in secret-key block ciphers. This choice directly induces the classical version of the differential attack by the use of XOR-kind ...
Biham E. +10 more
core +3 more sources
Differential Forgery Attack Against LAC [PDF]
LAC is one of the candidates to the CAESAR competition. In this note we present a differential forgery attack on LAC. We show that some differentials have a probability higher than 2^-64, using a collection of characteristics in order to evaluate a lower bound on the probability of a differential. This allows a forgery attack on the full LAC. This work
openaire +3 more sources
Cryptanalysis of an Image Encryption Scheme Based on a Compound Chaotic Sequence [PDF]
Recently, an image encryption scheme based on a compound chaotic sequence was proposed. In this paper, the security of the scheme is studied and the following problems are found: (1) a differential chosen-plaintext attack can break the scheme with only ...
Chen +13 more
core +3 more sources

