Results 61 to 70 of about 9,453 (199)

More Accurate Differential Properties of LED64 and Midori64

open access: yesIACR Transactions on Symmetric Cryptology, 2018
In differential cryptanalysis, a differential is more valuable than the single trail belonging to it in general. The traditional way to compute the probability of the differential is to sum the probabilities of all trails within it.
Ling Sun, Wei Wang, Meiqin Wang
doaj   +1 more source

New method of colour image encryption using triple chaotic maps

open access: yesIET Image Processing, Volume 18, Issue 12, Page 3262-3276, 16 October 2024.
Initially, the plain image is decomposed into the RGB format. An individual chaotic map is used in the permutation and diffusion of each map to break the correlations in the plain image. Lorenz, 2D‐Logistic, and Henon maps are used in different orders and with different orders of channels, producing a cipher image with the properties of randomness and ...
Khalid M. Hosny   +5 more
wiley   +1 more source

Construction of secure adaptive frequency hopping sequence sets based on AES algorithm

open access: yesIET Communications, Volume 18, Issue 8, Page 490-502, May 2024.
This paper leverages the advanced encryption standard algorithm to explore the construction of secure frequency hopping (FH) sequences and proposes two mapping methods tailored to scenarios where the number of frequency slots is either an integer power of two or not. The proposed FH sequence sets constructed via these methods exhibit adaptability to an
Dongpo Song   +3 more
wiley   +1 more source

ToFA: Towards Fault Analysis of GIFT and GIFT-like Ciphers Leveraging Truncated Impossible Differentials

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
In this work, we introduce ToFA, the first fault attack (FA) strategy that attempts to leverage the classically well-known idea of impossible differential cryptanalysis to mount practically verifiable attacks on bit-oriented ciphers like GIFT and ...
Anup Kumar Kundu   +3 more
doaj   +1 more source

Revisiting the shuffle of generalized Feistel structure

open access: yesCybersecurity
The Generalized Feistel Structure ( $$\texttt{GFS}$$ GFS ) is one of the most widely used frameworks in symmetric cipher design. In FES 2010, Suzaki and Minematsu strengthened the cryptanalysis security of $$\texttt{GFS}$$ GFS by searching for shuffles ...
Yincen Chen   +4 more
doaj   +1 more source

Automatic Search of Differential Characteristics and Improved Differential Cryptanalysis for PRINCE, QARMA, and MANTIS

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
Reflection structure has a significant advantage that realizing decryption and encryption results in minimum additional costs, and many block ciphers tend to adopt such structure to achieve the requirement of low overhead. PRINCE, MANTIS, QARMA, and PRINCEv2 are lightweight block ciphers with reflection feature proposed in recent years.
Yaxin Cui   +4 more
wiley   +1 more source

Cryptanalysis: Theory Versus Practice

open access: yesIACR Transactions on Symmetric Cryptology
Most modern cryptanalysis results are obtained through theoretical analysis, often relying on simplifications and idealized assumptions. In this work, we use the parallel computational power of GPUs to experimentally verify a small portion of the ...
Cihangir Tezcan   +2 more
doaj   +1 more source

Automated Differential‐Linear Cryptanalysis for AND‐RX Ciphers

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
Differential and linear cryptanalysis are two important methods to evaluate the security of block ciphers. Building on these two methods, differential‐linear (DL) cryptanalysis was introduced by Langford and Hellman in 1994. This cryptanalytic method has been not only extensively researched but also proven to be effective.
Wenya Li, Kai Zhang, Bin Hu, Yong Yu
wiley   +1 more source

Finding Impossible Differentials in ARX Ciphers under Weak Keys

open access: yesIACR Transactions on Symmetric Cryptology
Impossible differential cryptanalysis is very important in the field of symmetric ciphers. Currently, there are many automatic search approaches to find impossible differentials.
Qing Ling   +6 more
doaj   +1 more source

New Differential‐Based Distinguishers for Ascon via Constraint Programming

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
As the winner of the NIST lightweight cryptography project, Ascon has undergone extensive self‐evaluation and third‐party cryptanalysis. In this paper, we use constraint programming (CP) as a tool to analyze the Ascon permutation and propose several differential‐based distinguishers.
Chan Song   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy