Results 71 to 80 of about 9,083 (227)

Analysis of the cryptographic strength of the SHA-256 hash function using the SAT approach

open access: yesНаучно-технический вестник информационных технологий, механики и оптики
Cryptographic hash functions play a significant role in modern information security systems by ensuring data integrity and enabling efficient data compression. One of the most important and widely used cryptographic hash functions is SHA-256 that belongs
V. V. Davydov   +3 more
doaj   +1 more source

A deep learning aided differential distinguisher improvement framework with more lightweight and universality

open access: yesCybersecurity, 2023
In CRYPTO 2019, Gohr opens up a new direction for cryptanalysis. He successfully applied deep learning to differential cryptanalysis against the NSA block cipher SPECK32/64, achieving higher accuracy than traditional differential distinguishers.
JiaShuo Liu   +2 more
doaj   +1 more source

Dynamic MDS Matrices for Substantial Cryptographic Strength [PDF]

open access: yes, 2011
Ciphers get their strength from the mathematical functions of confusion and diffusion, also known as substitution and permutation. These were the basics of classical cryptography and they are still the basic part of modern ciphers.
Malik, Muhammad Yasir, No, Jong-Seon
core   +2 more sources

Bayesian System for Differential Cryptanalysis of DES

open access: yesIERI Procedia, 2014
AbstractThis paper proposes a new formalization for the differential cryptanalysis of DES (Data Encryption Standard) based on Bayesian Networks (BN), an artificial intelligence framework used for reasoning on data affected by uncertainty. Through the proposed approach it is possible to analyze DES from a novel point of view, thus paving the way for the
DE PAOLA, Alessandra   +2 more
openaire   +4 more sources

A DNA‐Dynamic Permutation‐Diffusion Algorithm for Image Encryption Using Scaling Chaotification Models and Advanced DNA Operations

open access: yesIET Image Processing, Volume 19, Issue 1, January/December 2025.
This paper proposes a DNA‐Dynamic Concurrent Permutation‐Diffusion Algorithm (DNA‐DCP‐DA) for secure image encryption, employing novel scaling chaotification models and advanced noncommutative DNA operations to address weaknesses in existing systems.
Mustafa Kamil Khairullah   +5 more
wiley   +1 more source

Impossible differential cryptanalysis of Saturnin algorithm

open access: yesTongxin xuebao, 2022
A lightweight block cipher, Saturnin, is an AES-like algorithm.In a resource-constrained environment, Saturnin can also provide high security.The impossible differential analysis on Saturnin was proposed.First, based on the structure of Saturnin, the ...
Zilong JIANG, Chenhui JIN
doaj   +2 more sources

Cybersecurity and Artificial Intelligence in Unmanned Aerial Vehicles: Emerging Challenges and Advanced Countermeasures

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The increasing adoption of artificial intelligence (AI)‐driven unmanned aerial vehicles (UAVs) in military, commercial, and surveillance operations has introduced significant security challenges, including cyber threats, adversarial AI attacks, and communication vulnerabilities. This paper presents a comprehensive review of the key security threats and
Deafallah Alsadie, Jiwei Tian
wiley   +1 more source

Bit-Based Evaluation of Lightweight Block Ciphers SLIM, LBC-IoT, and SLA by Mixed Integer Linear Programming

open access: yesIET Information Security
Many lightweight block ciphers have been proposed for IoT devices that have limited resources. SLIM, LBC-IoT, and SLA are lightweight block ciphers developed for IoT systems.
Nobuyuki Sugio
doaj   +1 more source

Towards Analysable Chaos-based Cryptosystems: Constructing Difference Distribution Tables for Chaotic Maps

open access: yesJournal of Informatics and Web Engineering
Chaos-based cryptography has yet to achieve practical, real-world applications despite extensive research. A major challenge is the difficulty in analysing the security of these cryptosystems, which often appear ad hoc in design.
Je Sen Teh, Abubakar Abba
doaj   +1 more source

On the Derivative Imbalance and Ambiguity of Functions

open access: yes, 2018
In 2007, Carlet and Ding introduced two parameters, denoted by $Nb_F$ and $NB_F$, quantifying respectively the balancedness of general functions $F$ between finite Abelian groups and the (global) balancedness of their derivatives $D_a F(x)=F(x+a)-F(x)$, $
Carlet, Claude   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy