Results 81 to 90 of about 12,474 (214)
Reflection structure has a significant advantage that realizing decryption and encryption results in minimum additional costs, and many block ciphers tend to adopt such structure to achieve the requirement of low overhead. PRINCE, MANTIS, QARMA, and PRINCEv2 are lightweight block ciphers with reflection feature proposed in recent years.
Yaxin Cui +4 more
wiley +1 more source
Revisiting the shuffle of generalized Feistel structure
The Generalized Feistel Structure ( $$\texttt{GFS}$$ GFS ) is one of the most widely used frameworks in symmetric cipher design. In FES 2010, Suzaki and Minematsu strengthened the cryptanalysis security of $$\texttt{GFS}$$ GFS by searching for shuffles ...
Yincen Chen +4 more
doaj +1 more source
Automated Differential‐Linear Cryptanalysis for AND‐RX Ciphers
Differential and linear cryptanalysis are two important methods to evaluate the security of block ciphers. Building on these two methods, differential‐linear (DL) cryptanalysis was introduced by Langford and Hellman in 1994. This cryptanalytic method has been not only extensively researched but also proven to be effective.
Wenya Li, Kai Zhang, Bin Hu, Yong Yu
wiley +1 more source
Cryptanalysis: Theory Versus Practice
Most modern cryptanalysis results are obtained through theoretical analysis, often relying on simplifications and idealized assumptions. In this work, we use the parallel computational power of GPUs to experimentally verify a small portion of the ...
Cihangir Tezcan +2 more
doaj +1 more source
New Differential‐Based Distinguishers for Ascon via Constraint Programming
As the winner of the NIST lightweight cryptography project, Ascon has undergone extensive self‐evaluation and third‐party cryptanalysis. In this paper, we use constraint programming (CP) as a tool to analyze the Ascon permutation and propose several differential‐based distinguishers.
Chan Song +3 more
wiley +1 more source
Finding Impossible Differentials in ARX Ciphers under Weak Keys
Impossible differential cryptanalysis is very important in the field of symmetric ciphers. Currently, there are many automatic search approaches to find impossible differentials.
Qing Ling +6 more
doaj +1 more source
Towards a combined Rotational-Differential Cryptanalytic Framework [PDF]
In this report, we suggest a new cryptanalytic framework of constructing distinguishers which can be eventually extended to full attacks in the related-key scenario. We name this new paradigm as ”Relational Cryptanalysis”. The main idea is to exhibit the
Christofi, M. +2 more
core
Using quantum key distribution for cryptographic purposes: a survey
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone
, +23 more
core +3 more sources
A performance analysis of Generalized Key Scheme Block Cipher (GKSBC) algorithm to Cryptanalytic Attacks [PDF]
Information is a commodity. Information has economic value and production of it incurs cost. Securing the information is posing a considerable challenge.
Jothi, S. A. (S)
core
FPGA BASED HARDWARE KEY FOR TEMPORAL ENCRYPTION [PDF]
In this paper, a novel encryption scheme with time based key technique on an FPGA is presented. Time based key technique ensures right key to be entered at right time and hence, vulnerability of encryption through brute force attack is eliminated ...
B. Lakshmi, E. Kirubakaran, T.N.Prabakar
doaj

