Results 251 to 260 of about 264,704 (267)
Some of the next articles are maybe not open access.

Linear Distinguishing Attack on Shannon

2008
In this paper, we present a linear distinguishing attack on the stream cipher Shannon. Our distinguisher can distinguish the output keystream of Shannon from 2107keystream words while using an array of 232counters. The distinguisher makes use of a multidimensional linear transformation instead of a one-dimensional transformation, which is traditionally
Risto M. Hakala, Kaisa Nyberg
openaire   +1 more source

Distinguishing Attacks on T-Functions

2005
Klimov and Shamir proposed a new class of simple cryptographic primitives named T-functions. For two concrete proposals based on the squaring operation, a single word T-function and a previously unbroken multi-word T-function with a 256-bit state, we describe an efficient distinguishing attack having a 232 data complexity.
Simon Künzli, Pascal Junod, Willi Meier
openaire   +1 more source

Improved Distinguishing Attack on Rabbit

2011
Rabbit is a stream cipher using a 128-bit key. It outputs one keystream block of 128 bits each time, which consists of eight sub-blocks of 16 bits. It is among the finalists of ECRYPT Stream Cipher Project (eSTREAM). Rabbit has also been published as informational RFC 4503 with IETF.
Yi Lu, Yvo Desmedt
openaire   +1 more source

A Distinguishing Attack with a Neural Network

2013 IEEE 13th International Conference on Data Mining Workshops, 2013
This paper proposes a new distinguishing-type attack to identify block ciphers. This attack utilises a multidisciplinary approach to the problem. It is grounded in a neural network, by means of a linguistic and an information retrieval approach, from patterns found on a set of cipher texts.
William A.R. De Souza, Allan Tomlinson
openaire   +1 more source

Distinguishing attack and second preimage attack on Mini-AES CBC-MAC

2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA), 2014
In this paper, we present a distinguishing attack and second pre-image attack on specific MAC algorithm based on block cipher, Mini-AES CBC-MAC. Conceptually we use Jia et al. methods, but we perform the attacks with smaller input modification. Using smaller input modification, the results are relatively same.
Cahyo Ramdhani Wulamarisman   +1 more
openaire   +1 more source

Distinguishing Attacks on (Ultra-)Lightweight WG Ciphers

2017
The Welch-Gong (WG) family of stream ciphers include two subfamilies, which we call WG-A and WG-B, of patented (ultra-)lightweight ciphers designed by Gong et al. The Waterloo Commercialization Office, Canada, has included the WG-A in an RFID anti-counterfeiting system and has proposed the WG-B for securing 4G networks.
Mabin Joseph   +2 more
openaire   +1 more source

Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

AIP Conference Proceedings, 2016
In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found.
Sigit Ariwibowo, Susila Windarta
openaire   +1 more source

A new distinguish attack against ABC stream cipher

The 9th International Conference on Advanced Communication Technology, 2007
ABC is a synchronous stream cipher proposed by Anashin, Bogdanov, Kizhvatov and Kumar as a candidate for ECRYPT Project (call for Stream Cipher). ABC cipher consists of three component named A, B, and C and gets a key and an initial vector (IV) each of 128-bit length.
Aboifazl Falahati   +3 more
openaire   +1 more source

Distinguishing Novel Usage From Novel Attacks

2006
Abstract : In this project, ATC-NY is developing methods for evaluating anomalous behavior concurrently with reacting to it. Anomalous events that are not so suspicious as to cause an immediate alarm are continually reexamined in the light of later events, with the goal of eventually understanding whether they are benign or malign. As time goes on, the
openaire   +1 more source

Distinguishing Attack on SOBER-128 with Linear Masking

2006
We present a distinguishing attack against SOBER-128 with linear masking. We found a linear approximation which has a bias of 2−−8.8 for the non-linear filter. The attack applies the observation made by Ekdahl and Johansson that there is a sequence of clocks for which the linear combination of some states vanishes.
Cho, Joo, Pieprzyk, Josef
openaire   +2 more sources

Home - About - Disclaimer - Privacy