Results 51 to 60 of about 9,453 (199)
Multiple Impossible Differentials Attack on AES-192
The security of AES-192 against multiple impossible differentials attack is studied in this paper. Based on two types of impossible differentials for 4-round AES, two 7-round attack trails of AES-192 with the same plaintext and ciphertext difference ...
Zilong Jiang, Chenhui Jin, Zebin Wang
doaj +1 more source
This paper proposes a DNA‐Dynamic Concurrent Permutation‐Diffusion Algorithm (DNA‐DCP‐DA) for secure image encryption, employing novel scaling chaotification models and advanced noncommutative DNA operations to address weaknesses in existing systems.
Mustafa Kamil Khairullah +5 more
wiley +1 more source
Yoyo Cryptanalysis Against Reduced‐Round L‐Feistel Structure for Recovering the Secret Components
L‐Feistel structure is a new iterative block cipher structure and unifies the Feistel structure and the Lai–Massey structure while maintaining the similarity of encryption and decryption. In this study, we present the first yoyo cryptanalysis against the L‐Feistel structure to evaluate the security under structural attack and give the method to recover
Jiyan Zhang +4 more
wiley +1 more source
Quantum Automated Tools for Finding Impossible Differentials
Due to the superiority of quantum computing, traditional cryptography is facing a severe threat. This makes the security evaluation of cryptographic systems in quantum attack models both significant and urgent.
Huiqin Xie +4 more
doaj +1 more source
Security Analysis of SKINNY under Related-Tweakey Settings
In CRYPTO’16, a new family of tweakable lightweight block ciphers - SKINNY was introduced. Denoting the variants of SKINNY as SKINNY-n-t, where n represents the block size and t represents the tweakey length, the design specifies t ∈ {n, 2n, 3n}. In this
Guozhen Liu, Mohona Ghosh, Ling Song
doaj +1 more source
A Provably Secure Authentication Protocol Based on PUF and ECC for IoT Cloud‐Edge Environments
The Internet of Things (IoT) cloud model provides an efficient scheme for rapid collection, storage, processing, and analysis of massive node data, and its application has gradually expanded to key areas such as healthcare and transportation. However, the security issues of open channel transmission in IoT still persist. Researchers have proposed a lot
Xiong Wang +5 more
wiley +1 more source
NoLIEM: A Novel Lightweight Image Encryption Method for Resource‐Constrained IoT Devices
The expanded use of Internet of Things (IoT) devices in smart homes, industrial automation, healthcare, and smart cities has increased the risk of unauthorized access, data breaches, and man‐in‐the‐middle attacks. Traditional encryption methods like AES and RSA are too energy‐ and processing‐intensive for IoT devices.
Athraa J. H. Witwit +3 more
wiley +1 more source
A Novel Method of Data Protection Through DNA Chromosome Databases
With the advancement of the digital age, data have become insecure, which requires techniques to secure data. Deoxyribonucleic acid (DNA) has become an increasingly secure technology for storing next‐generation digital data. DNA provides superior capabilities due to its high and efficient storage capacity and long lifespan.
Sadoon Hussein +2 more
wiley +1 more source
A literature review on V2X communications security: Foundation, solutions, status, and future
The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV ...
Zuobin Ying +3 more
wiley +1 more source
Evaluating cryptographic vulnerabilities created by quantum computing in industrial control systems
Abstract Quantum computing is expected to eventually be able to break the public‐key cryptography algorithms currently used throughout information technology (IT) infrastructure, undermining foundational tools used to maintain information security across the country's critical infrastructure.
Michael J. D. Vermeer +5 more
wiley +1 more source

