Results 101 to 110 of about 2,248,235 (257)

Impossible Differential Cryptanalysis of Surge

open access: yesIOP Conference Series: Earth and Environmental Science, 2020
Abstract In 2018, Li Lang et al. proposed a new lightweight block cipher which is called Surge. Its block size is 64-bit, and the length of key size is 64/80/128-bit, respectively. They also proved that the cipher has good performance on security and effectively resists on differential attack, linear attack and algebraic attack.
Zhiqiang Qu, Xuan Shen, Jun He
openaire   +1 more source

Differential Cryptanalysis on Chaotic Based Image Encryption Scheme

open access: yesIOP Conference Series: Materials Science and Engineering, 2019
Image encryption schemes based on chaotic maps and systems have been investigated for more than one decade. However, many proposed schemes that obtained good score in the statistical tests, i.e.
K. Wong, W. Yap, B. Goi, D. C. Wong
semanticscholar   +1 more source

Differential-Linear Cryptanalysis of GIFT family and GIFT-based Ciphers

open access: yesIACR Commun. Cryptol.
At CHES 2017, Banik et al. proposed a lightweight block cipher GIFT consisting of two versions GIFT-64 and GIFT-128. Recently, there are lots of authenticated encryption schemes that adopt GIFT-128 as their underlying primitive, such as GIFT-COFB and ...
Shichang Wang   +3 more
semanticscholar   +1 more source

Differential experiments using parallel alternative operations

open access: yesJournal of Mathematical Cryptology
The use of alternative operations in differential cryptanalysis, or alternative notions of differentials, is lately receiving increasing attention. Recently, Civino et al.
Calderini Marco   +2 more
doaj   +1 more source

Differential Cryptanalysis of Nimbus [PDF]

open access: yes, 2002
Nimbus is a block cipher submitted as a candidate to the NESSIE project by Alexis Machado. Like many other ciphers Nimbus combines multiplication operations with XOR operations, a common technique to protect against various kinds of cryptanalysis.In this paper we present two new differential properties of multiplication operations with probability ...
openaire   +1 more source

Impossible Differential Cryptanalysis of Zodiac [PDF]

open access: yes, 2002
We discuss the impossible differential cryptanalysis of the blockcipher Zodiac. The main design principles of Zodiac are simplicity and efficiency. However the diffusion layer in its round function is too simple to offer enough security. An impossible differential cryptanalysis is a proper method to attack the weakness of Zodiac.
Deukjo Hong   +4 more
openaire   +1 more source

Analysing Relations involving small number of Monomials in AES S- Box [PDF]

open access: yes, 2017
In the present day, AES is one the most widely used and most secure Encryption Systems prevailing. So, naturally lots of research work is going on to mount a significant attack on AES.
Ghosal, Riddhi
core   +1 more source

Exact Formula for RX-Differential Probability Through Modular Addition for All Rotations

open access: yesIACR Transactions on Symmetric Cryptology
This work presents an exact and compact formula for the probability of rotation-xor differentials (RX-differentials) through modular addition, for arbitrary rotation amounts, which has been a long-standing open problem. The formula comes with a rigorous
Alex Biryukov   +2 more
doaj   +1 more source

Differential Cryptanalysis of KHF [PDF]

open access: yes, 1998
Bakhtiari et al recently proposed a fast message authentication primitive called KHF. This paper shows that KHF is highly vulnerable to differential cryptanalysis: it can be broken with about 37 chosen message queries. This suggests that the KHF design should be reconsidered.
openaire   +1 more source

Home - About - Disclaimer - Privacy