Results 91 to 100 of about 3,190 (199)

New method of colour image encryption using triple chaotic maps

open access: yesIET Image Processing, Volume 18, Issue 12, Page 3262-3276, 16 October 2024.
Initially, the plain image is decomposed into the RGB format. An individual chaotic map is used in the permutation and diffusion of each map to break the correlations in the plain image. Lorenz, 2D‐Logistic, and Henon maps are used in different orders and with different orders of channels, producing a cipher image with the properties of randomness and ...
Khalid M. Hosny   +5 more
wiley   +1 more source

Finding Impossible Differentials in ARX Ciphers under Weak Keys

open access: yesIACR Transactions on Symmetric Cryptology
Impossible differential cryptanalysis is very important in the field of symmetric ciphers. Currently, there are many automatic search approaches to find impossible differentials.
Qing Ling   +6 more
doaj   +1 more source

Doubly Perfect Nonlinear Boolean Permutations

open access: yes, 2010
Due to implementation constraints the XOR operation is widely used in order to combine plaintext and key bit-strings in secret-key block ciphers. This choice directly induces the classical version of the differential attack by the use of XOR-kind ...
Biham E.   +10 more
core   +3 more sources

Towards a combined Rotational-Differential Cryptanalytic Framework [PDF]

open access: yes, 2014
In this report, we suggest a new cryptanalytic framework of constructing distinguishers which can be eventually extended to full attacks in the related-key scenario. We name this new paradigm as ”Relational Cryptanalysis”. The main idea is to exhibit the
Christofi, M.   +2 more
core  

Image Encryption Based on Diffusion and Multiple Chaotic Maps

open access: yes, 2011
In the recent world, security is a prime important issue, and encryption is one of the best alternative way to ensure security. More over, there are many image encryption schemes have been proposed, each one of them has its own strength and weakness ...
bagan, Dr. K. Bhoopathy   +2 more
core   +1 more source

A Meaningful MD5 Hash Collision Attack [PDF]

open access: yes, 2006
It is now proved by Wang et al., that MD5 hash is no more secure, after they proposed an attack that would generate two different messages that gives the same MD5 sum. Many conditions need to be satisfied to attain this collision.
Kashyap, Narayana D.
core   +1 more source

Impossible Differential Cryptanalysis on Lai-Massey Scheme

open access: yesETRI Journal, 2014
The Lai-Massey scheme, proposed by Vaudenay, is a modified structure in the International Data Encryption Algorithm cipher. A family of block ciphers, named FOX, were built on the Lai-Massey scheme. Impossible differential cryptanalysis is a powerful technique used to recover the secret key of block ciphers.
Rui Guo, Chenhui Jin
openaire   +1 more source

FPGA BASED HARDWARE KEY FOR TEMPORAL ENCRYPTION [PDF]

open access: yesICTACT Journal on Communication Technology, 2010
In this paper, a novel encryption scheme with time based key technique on an FPGA is presented. Time based key technique ensures right key to be entered at right time and hence, vulnerability of encryption through brute force attack is eliminated ...
B. Lakshmi, E. Kirubakaran, T.N.Prabakar
doaj  

Quantum cryptography: key distribution and beyond

open access: yes, 2018
Uniquely among the sciences, quantum cryptography has driven both foundational research as well as practical real-life applications. We review the progress of quantum cryptography in the last decade, covering quantum key distribution and other ...
H., Akshata Shenoy   +2 more
core   +1 more source

Cryptanalysis of QARMAv2

open access: yesIACR Transactions on Symmetric Cryptology
QARMAv2 is a general-purpose and hardware-oriented family of lightweight tweakable block ciphers (TBCs) introduced in ToSC 2023. QARMAv2, as a redesign of QARMAv1 with a longer tweak and tighter security margins, is also designed to be suitable for ...
Hosein Hadipour, Yosuke Todo
doaj   +1 more source

Home - About - Disclaimer - Privacy