Results 101 to 110 of about 8,822 (201)

Revisiting the shuffle of generalized Feistel structure

open access: yesCybersecurity
The Generalized Feistel Structure ( $$\texttt{GFS}$$ GFS ) is one of the most widely used frameworks in symmetric cipher design. In FES 2010, Suzaki and Minematsu strengthened the cryptanalysis security of $$\texttt{GFS}$$ GFS by searching for shuffles ...
Yincen Chen   +4 more
doaj   +1 more source

A New (Related-Key) Neural Distinguisher Using Two Differences for Differential Cryptanalysis

open access: yesIET Information Security
At CRYPTO 2019, Gohr showed the significant advantages of neural distinguishers over traditional distinguishers in differential cryptanalysis. At fast software encryption (FSE) 2024, Bellini et al.
Gao Wang, Gaoli Wang, Siwei Sun
doaj   +1 more source

ESTABLISHED WAYS TO ATTACK EVEN THE BEST ENCRYPTION ALGORITHM [PDF]

open access: yes
Which solution is the best – public key or private key encryption? This question cannot have a very rigorous, logical and definitive answer, so that the matter be forever settled :).
Alexandru Tabusca
core  

Improving Differential-Neural Cryptanalysis

open access: yesIACR Communications in Cryptology
Our first objective is to enhance the capabilities of differential-neural distinguishers by applying more deep-learning techniques, focusing on handling more rounds and improving accuracy. Inspired by the Inception Block in GoogLeNet, we adopted a design that uses multiple parallel convolutional layers with varying kernel sizes before the residual
Liu Zhang, Zilong Wang, Baocang Wang
openaire   +1 more source

Quantum impossible differential and truncated differential cryptanalysis

open access: yes, 2017
Traditional cryptography is suffering a huge threat from the development of quantum computing. While many currently used public-key cryptosystems would be broken by Shor's algorithm, the effect of quantum computing on symmetric ones is still unclear. The security of symmetric ciphers relies heavily on the development of cryptanalytic tools.
Xie, Huiqin, Yang, Li
openaire   +2 more sources

DIFFERENTIAL CRYPTANALYSIS OF THE MARS BLOCKCIPHER

open access: yesPrikladnaya diskretnaya matematika, 2009
Summary: In this work we present a differential attack on MARS which breaks 8 core and 8 mixing rounds with pre- and post-whitening. This attack is based on a new 8-core round differential characteristic with probability \(2^{-98}\) and allows to recover more subkeys bits than previously published attacks (752 instead of 682) faster than exhaustive key
openaire   +2 more sources

Computing the Differential Probability of a Word-Based Block Cipher

open access: yesCryptography
Differential cryptanalysis is one of the fundamental cryptanalysis techniques to evaluate the security of the block cipher. In many cases, resistance to differential cryptanalysis is proven through the upper bound of the differential characteristic ...
Dawoon Kwon, Junghwan Song
doaj   +1 more source

Differential-Linear Cryptanalysis and Cube Attacks on ChiLow

open access: yesIACR Transactions on Symmetric Cryptology
ChiLow is a family of tweakable block ciphers specifically designed for embedded code encryption, proposed at EUROCRYPT 2025. Its novel nested tweakkey schedule and a variant of the χ function significantly enhance latency and energy efficiency.
Cheng Che, Tian Tian
doaj   +1 more source

Quantum Automated Tools for Finding Impossible Differentials

open access: yesMathematics
Due to the superiority of quantum computing, traditional cryptography is facing a severe threat. This makes the security evaluation of cryptographic systems in quantum attack models both significant and urgent.
Huiqin Xie   +4 more
doaj   +1 more source

DIFFERENTIAL AND LINEAR CRYPTOANALYSIS METHODS ELEMENTS FOR ENCRYPTION ALGORITHM BASED ON DYNAMIC CHAOS

open access: yesСистемный анализ и прикладная информатика, 2015
In this paper we assessed the sustainability of the encryption algorithm based on dynamic chaos, as well as the basic principles for the implementation of linear and differential cryptanalysis.
A. V. Sidorenko, L. A. Zhukovets
doaj  

Home - About - Disclaimer - Privacy