Results 51 to 60 of about 2,248,235 (257)
Breaking an image encryption algorithm based on chaos
Recently, a chaos-based image encryption algorithm called MCKBA (Modified Chaotic-Key Based Algorithm) was proposed. This paper analyzes the security of MCKBA and finds that it can be broken with a differential attack, which requires only four chosen ...
Arroyo D. +4 more
core +1 more source
Quantum differential cryptanalysis based on Bernstein-Vazirani algorithm
Recent research has demonstrated the potential of quantum algorithms to exploit vulnerabilities in various popular constructions, such as certain block ciphers like Feistel, Even-Mansour, and multiple MACs, within the superposition query model.
Rong-Xue Xu +4 more
semanticscholar +1 more source
NBC is a family of block ciphers using Generalized Feistel structure, designed by Xu Hong et al. There are three block and key sizes,i.e.,128/128, 128/256 and 256/256. A 16-bit Sbox is involved in the cipher as the non-linear component.
Yang Jiangshuai +3 more
doaj +1 more source
Differential-Linear Cryptanalysis of Reduced Round ChaCha
ChaCha is a well-known stream cipher that has been used in many network protocols and software. In this paper, we study the security of reduced round ChaCha.
Zhichao Xu +3 more
openalex +3 more sources
A Secure and Robust Blockchain‐Based Medical Image Encryption Approach Using Lorenz Chaotic System
Keeping medical images confidential while transmitting is crucial, especially in an open networking environment. One effective approach is blockchain‐based encryption, which provides strong security for sensitive healthcare data. To ensure the greatest levels of medical data integrity and authenticity, our proposed scheme employs a unique Lorenz ...
Fahima Hajjej +4 more
wiley +1 more source
Software system of cryptanalysis using impossible differentials method based on parallel programming technologies OpenMP and MPI [PDF]
Програма, яка розробляється в даному проекті, призначена для проведення криптоаналізу методом неможливих диференціалів блокового симетричного шифру AES, а саме – над елементами раунду.The program is being developed in this project is designed for ...
Novak, Nazarii +1 more
core
Linear and Differential Cryptanalysis of SHA-256 [PDF]
The one-way hash function plays an important role in digital signatures and message authentication from the viewpoint of security. No effective attacking method has been discovered to the algorithm of hash function standard.
Ishikawa, Hirofumi, Wang, Xiao Dong
core +1 more source
This work presents a secure telemedicine cryptosystem based on a novel 4D memristive chaotic oscillator and a Dispatched Gray Code Scrambler (DGCS). Implemented on FPGA, the system ensures power‐efficient encryption, making it suitable for real‐time medical image transmission in IoT healthcare environments.
Fritz Nguemo Kemdoum +3 more
wiley +1 more source
Lightweight Cryptanalysis of IoT Encryption Algorithms: Is Quota Sampling the Answer?
Rapid growth in the number of small sensor devices known as the Internet of Things (IoT) has seen the development of lightweight encryption algorithms. Two well-known lightweight algorithms are SIMON and SIMECK which have been specifically designed for ...
Jonathan Cook +2 more
doaj +1 more source
Security evaluation, NPCR + UACI results of 99.5978% and 33.4549% respectively, confirm the system is secure against statistical and differential attacks. Besides, the FPGA implementation achieves low power of 115 mW at a speed of 42.56 MHz. This makes it suitable for IoT applications where power and hardware resources are constrained. ABSTRACT In this
Fritz Nguemo Kemdoum +4 more
wiley +1 more source

