Results 121 to 130 of about 2,248,235 (257)
Revisiting the shuffle of generalized Feistel structure
The Generalized Feistel Structure ( $$\texttt{GFS}$$ GFS ) is one of the most widely used frameworks in symmetric cipher design. In FES 2010, Suzaki and Minematsu strengthened the cryptanalysis security of $$\texttt{GFS}$$ GFS by searching for shuffles ...
Yincen Chen +4 more
doaj +1 more source
EVALUATION OF CRYPTOGRAPHIC ALGORITHMS [PDF]
This article represents a synthesis of the evaluation methods for cryptographic algorithms and of their efficiency within practical applications. It approaches also the main operations carried out in cryptanalysis and the main categories and methods of ...
Emil Simion, Mircea Andraşiu
core
Quantum impossible differential and truncated differential cryptanalysis
Traditional cryptography is suffering a huge threat from the development of quantum computing. While many currently used public-key cryptosystems would be broken by Shor's algorithm, the effect of quantum computing on symmetric ones is still unclear. The security of symmetric ciphers relies heavily on the development of cryptanalytic tools.
Xie, Huiqin, Yang, Li
openaire +2 more sources
DIFFERENTIAL CRYPTANALYSIS OF THE MARS BLOCKCIPHER
Summary: In this work we present a differential attack on MARS which breaks 8 core and 8 mixing rounds with pre- and post-whitening. This attack is based on a new 8-core round differential characteristic with probability \(2^{-98}\) and allows to recover more subkeys bits than previously published attacks (752 instead of 682) faster than exhaustive key
openaire +2 more sources
Computing the Differential Probability of a Word-Based Block Cipher
Differential cryptanalysis is one of the fundamental cryptanalysis techniques to evaluate the security of the block cipher. In many cases, resistance to differential cryptanalysis is proven through the upper bound of the differential characteristic ...
Dawoon Kwon, Junghwan Song
doaj +1 more source
On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis
Dhiman Saha +5 more
openalex +2 more sources
Impossible Differential Cryptanalysis of Lightweight Block Cipher WARP [PDF]
Hong Xu +3 more
openalex +1 more source
Quantum Automated Tools for Finding Impossible Differentials
Due to the superiority of quantum computing, traditional cryptography is facing a severe threat. This makes the security evaluation of cryptographic systems in quantum attack models both significant and urgent.
Huiqin Xie +4 more
doaj +1 more source
In this paper we assessed the sustainability of the encryption algorithm based on dynamic chaos, as well as the basic principles for the implementation of linear and differential cryptanalysis.
A. V. Sidorenko, L. A. Zhukovets
doaj
On Differential and Linear Cryptanalysis of the RC5 Encryption Algorithm [PDF]
Burton S. Kaliski, Yiqun Lisa Yin
openalex +1 more source

