Results 121 to 130 of about 2,248,235 (257)

Revisiting the shuffle of generalized Feistel structure

open access: yesCybersecurity
The Generalized Feistel Structure ( $$\texttt{GFS}$$ GFS ) is one of the most widely used frameworks in symmetric cipher design. In FES 2010, Suzaki and Minematsu strengthened the cryptanalysis security of $$\texttt{GFS}$$ GFS by searching for shuffles ...
Yincen Chen   +4 more
doaj   +1 more source

EVALUATION OF CRYPTOGRAPHIC ALGORITHMS [PDF]

open access: yes
This article represents a synthesis of the evaluation methods for cryptographic algorithms and of their efficiency within practical applications. It approaches also the main operations carried out in cryptanalysis and the main categories and methods of ...
Emil Simion, Mircea Andraşiu
core  

Quantum impossible differential and truncated differential cryptanalysis

open access: yes, 2017
Traditional cryptography is suffering a huge threat from the development of quantum computing. While many currently used public-key cryptosystems would be broken by Shor's algorithm, the effect of quantum computing on symmetric ones is still unclear. The security of symmetric ciphers relies heavily on the development of cryptanalytic tools.
Xie, Huiqin, Yang, Li
openaire   +2 more sources

DIFFERENTIAL CRYPTANALYSIS OF THE MARS BLOCKCIPHER

open access: yesPrikladnaya diskretnaya matematika, 2009
Summary: In this work we present a differential attack on MARS which breaks 8 core and 8 mixing rounds with pre- and post-whitening. This attack is based on a new 8-core round differential characteristic with probability \(2^{-98}\) and allows to recover more subkeys bits than previously published attacks (752 instead of 682) faster than exhaustive key
openaire   +2 more sources

Computing the Differential Probability of a Word-Based Block Cipher

open access: yesCryptography
Differential cryptanalysis is one of the fundamental cryptanalysis techniques to evaluate the security of the block cipher. In many cases, resistance to differential cryptanalysis is proven through the upper bound of the differential characteristic ...
Dawoon Kwon, Junghwan Song
doaj   +1 more source

On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis

open access: diamond, 2020
Dhiman Saha   +5 more
openalex   +2 more sources

Impossible Differential Cryptanalysis of Lightweight Block Cipher WARP [PDF]

open access: green, 2023
Hong Xu   +3 more
openalex   +1 more source

Quantum Automated Tools for Finding Impossible Differentials

open access: yesMathematics
Due to the superiority of quantum computing, traditional cryptography is facing a severe threat. This makes the security evaluation of cryptographic systems in quantum attack models both significant and urgent.
Huiqin Xie   +4 more
doaj   +1 more source

DIFFERENTIAL AND LINEAR CRYPTOANALYSIS METHODS ELEMENTS FOR ENCRYPTION ALGORITHM BASED ON DYNAMIC CHAOS

open access: yesСистемный анализ и прикладная информатика, 2015
In this paper we assessed the sustainability of the encryption algorithm based on dynamic chaos, as well as the basic principles for the implementation of linear and differential cryptanalysis.
A. V. Sidorenko, L. A. Zhukovets
doaj  

Home - About - Disclaimer - Privacy