Results 81 to 90 of about 3,178 (206)
A literature review on V2X communications security: Foundation, solutions, status, and future
The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV ...
Zuobin Ying +3 more
wiley +1 more source
In this work, we introduce ToFA, the first fault attack (FA) strategy that attempts to leverage the classically well-known idea of impossible differential cryptanalysis to mount practically verifiable attacks on bit-oriented ciphers like GIFT and ...
Anup Kumar Kundu +3 more
doaj +1 more source
Evaluating cryptographic vulnerabilities created by quantum computing in industrial control systems
Abstract Quantum computing is expected to eventually be able to break the public‐key cryptography algorithms currently used throughout information technology (IT) infrastructure, undermining foundational tools used to maintain information security across the country's critical infrastructure.
Michael J. D. Vermeer +5 more
wiley +1 more source
Revisiting the shuffle of generalized Feistel structure
The Generalized Feistel Structure ( $$\texttt{GFS}$$ GFS ) is one of the most widely used frameworks in symmetric cipher design. In FES 2010, Suzaki and Minematsu strengthened the cryptanalysis security of $$\texttt{GFS}$$ GFS by searching for shuffles ...
Yincen Chen +4 more
doaj +1 more source
New method of colour image encryption using triple chaotic maps
Initially, the plain image is decomposed into the RGB format. An individual chaotic map is used in the permutation and diffusion of each map to break the correlations in the plain image. Lorenz, 2D‐Logistic, and Henon maps are used in different orders and with different orders of channels, producing a cipher image with the properties of randomness and ...
Khalid M. Hosny +5 more
wiley +1 more source
Cryptanalysis: Theory Versus Practice
Most modern cryptanalysis results are obtained through theoretical analysis, often relying on simplifications and idealized assumptions. In this work, we use the parallel computational power of GPUs to experimentally verify a small portion of the ...
Cihangir Tezcan +2 more
doaj +1 more source
Impossible Differential Cryptanalysis of 16/18-Round Khudra
Khudra is a recently proposed lightweight block cipher specifically dedicated for Field Programmable Gate Arrays (FPGAs) implementation. It is a 4-branch type-2 generalized Feistel structure (GFS) of 18 rounds with 64-bit block size and 80-bit security margin. This paper studies the security of Khudra against impossible differential cryptanalysis.
Karakoc, Ferhat +3 more
openaire +2 more sources
Construction of secure adaptive frequency hopping sequence sets based on AES algorithm
This paper leverages the advanced encryption standard algorithm to explore the construction of secure frequency hopping (FH) sequences and proposes two mapping methods tailored to scenarios where the number of frequency slots is either an integer power of two or not. The proposed FH sequence sets constructed via these methods exhibit adaptability to an
Dongpo Song +3 more
wiley +1 more source
Finding Impossible Differentials in ARX Ciphers under Weak Keys
Impossible differential cryptanalysis is very important in the field of symmetric ciphers. Currently, there are many automatic search approaches to find impossible differentials.
Qing Ling +6 more
doaj +1 more source
Using quantum key distribution for cryptographic purposes: a survey
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone
, +23 more
core +3 more sources

