Results 81 to 90 of about 3,178 (206)

A literature review on V2X communications security: Foundation, solutions, status, and future

open access: yesIET Communications, Volume 18, Issue 20, Page 1683-1715, December 2024.
The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV ...
Zuobin Ying   +3 more
wiley   +1 more source

ToFA: Towards Fault Analysis of GIFT and GIFT-like Ciphers Leveraging Truncated Impossible Differentials

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
In this work, we introduce ToFA, the first fault attack (FA) strategy that attempts to leverage the classically well-known idea of impossible differential cryptanalysis to mount practically verifiable attacks on bit-oriented ciphers like GIFT and ...
Anup Kumar Kundu   +3 more
doaj   +1 more source

Evaluating cryptographic vulnerabilities created by quantum computing in industrial control systems

open access: yesJournal of Critical Infrastructure Policy, Volume 5, Issue 2, Page 88-110, Fall/Winter 2024.
Abstract Quantum computing is expected to eventually be able to break the public‐key cryptography algorithms currently used throughout information technology (IT) infrastructure, undermining foundational tools used to maintain information security across the country's critical infrastructure.
Michael J. D. Vermeer   +5 more
wiley   +1 more source

Revisiting the shuffle of generalized Feistel structure

open access: yesCybersecurity
The Generalized Feistel Structure ( $$\texttt{GFS}$$ GFS ) is one of the most widely used frameworks in symmetric cipher design. In FES 2010, Suzaki and Minematsu strengthened the cryptanalysis security of $$\texttt{GFS}$$ GFS by searching for shuffles ...
Yincen Chen   +4 more
doaj   +1 more source

New method of colour image encryption using triple chaotic maps

open access: yesIET Image Processing, Volume 18, Issue 12, Page 3262-3276, 16 October 2024.
Initially, the plain image is decomposed into the RGB format. An individual chaotic map is used in the permutation and diffusion of each map to break the correlations in the plain image. Lorenz, 2D‐Logistic, and Henon maps are used in different orders and with different orders of channels, producing a cipher image with the properties of randomness and ...
Khalid M. Hosny   +5 more
wiley   +1 more source

Cryptanalysis: Theory Versus Practice

open access: yesIACR Transactions on Symmetric Cryptology
Most modern cryptanalysis results are obtained through theoretical analysis, often relying on simplifications and idealized assumptions. In this work, we use the parallel computational power of GPUs to experimentally verify a small portion of the ...
Cihangir Tezcan   +2 more
doaj   +1 more source

Impossible Differential Cryptanalysis of 16/18-Round Khudra

open access: yes, 2017
Khudra is a recently proposed lightweight block cipher specifically dedicated for Field Programmable Gate Arrays (FPGAs) implementation. It is a 4-branch type-2 generalized Feistel structure (GFS) of 18 rounds with 64-bit block size and 80-bit security margin. This paper studies the security of Khudra against impossible differential cryptanalysis.
Karakoc, Ferhat   +3 more
openaire   +2 more sources

Construction of secure adaptive frequency hopping sequence sets based on AES algorithm

open access: yesIET Communications, Volume 18, Issue 8, Page 490-502, May 2024.
This paper leverages the advanced encryption standard algorithm to explore the construction of secure frequency hopping (FH) sequences and proposes two mapping methods tailored to scenarios where the number of frequency slots is either an integer power of two or not. The proposed FH sequence sets constructed via these methods exhibit adaptability to an
Dongpo Song   +3 more
wiley   +1 more source

Finding Impossible Differentials in ARX Ciphers under Weak Keys

open access: yesIACR Transactions on Symmetric Cryptology
Impossible differential cryptanalysis is very important in the field of symmetric ciphers. Currently, there are many automatic search approaches to find impossible differentials.
Qing Ling   +6 more
doaj   +1 more source

Using quantum key distribution for cryptographic purposes: a survey

open access: yes, 2014
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone
,   +23 more
core   +3 more sources

Home - About - Disclaimer - Privacy