Results 11 to 20 of about 1,200 (193)

Linearity in decimation-based generators: an improved cryptanalysis on the shrinking generator [PDF]

open access: goldOpen Mathematics, 2018
Decimation-based sequence generators are a class of non-linear cryptographic generators designed to be used in hardware implementations. An inherent characteristic of such generators is that their output sequences are interleaved sequences.
Cardell Sara D.   +2 more
doaj   +2 more sources

On a Linear Cryptanalysis of a Family of Modified DES Ciphers with Even Weight S-Boxes [PDF]

open access: diamondCybernetics and Information Technologies, 2016
We investigate the effect of inserting extra linearity in the Data Encryption Standard (DES) through appropriate nonsingular linear encodings of the output of the individual S-boxes.
Borissov Yuri   +2 more
doaj   +2 more sources

Linear Cryptanalysis Using Multiple Approximations [PDF]

open access: bronze, 1994
We present a technique which aids in the linear cryptanalysis of a block cipher and allows for a reduction in the amount of data required for a successful attack. We note the limits of this extension when applied to DES, but illustrate that it is generally applicable and might be exceptionally successful when applied to other block ciphers. This forces
Burton S. Kaliski, Matthew J. B. Robshaw
openalex   +3 more sources

Differential-Linear Cryptanalysis of Reduced Round ChaCha

open access: diamondIACR Transactions on Symmetric Cryptology
ChaCha is a well-known stream cipher that has been used in many network protocols and software. In this paper, we study the security of reduced round ChaCha. First, by considering the differential-linear hull effect, we improve the correlation of a four-
Zhichao Xu, Hong Xu, Lin Tan, Wenfeng Qi
doaj   +3 more sources

Differential-linear cryptanalysis of PRINCE cipher

open access: yes网络与信息安全学报, 2021
PRINCE is a low-latency lightweight block cipher, which is widely used in a lot of resource constrained devices. It is based on the FX construction and the core component is PRINCEcore.
LIU Zhengbin
doaj   +3 more sources

Multidimensional Linear Cryptanalysis [PDF]

open access: yesJournal of Cryptology, 2018
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hermelin, Miia   +2 more
openaire   +3 more sources

Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK

open access: yesIET Information Security, 2023
Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment.
Sugio Nobuyuki
doaj   +1 more source

Blocking Linear Cryptanalysis Attacks Found on Cryptographic Algorithms Used on Internet of Thing Based on the Novel Approaches of Using Galois Field (GF (232)) and High Irreducible Polynomials

open access: yesApplied Sciences, 2023
Attacks on the Internet of Things (IoT) are not highly considered during the design and implementation. The prioritization is making profits and supplying services to clients. Most cryptographic algorithms that are commonly used on the IoT are vulnerable
Khumbelo Difference Muthavhine   +1 more
doaj   +1 more source

Rotational Differential-Linear Cryptanalysis Revisited

open access: yesJournal of Cryptology, 2022
AbstractThe differential-linear attack, combining the power of the two most effective techniques for symmetric-key cryptanalysis, was proposed by Langford and Hellman at CRYPTO 1994. From the exact formula for evaluating the bias of a differential-linear distinguisher (JoC 2017), to the differential-linear connectivity table technique for dealing with ...
Liu, Yunwen   +4 more
openaire   +2 more sources

On Multidimensional Linear Cryptanalysis [PDF]

open access: yes, 2010
Matsui's Algorithms 1 and 2 with multiple approximations have been studied over 16 years. In CRYPTO'04, Biryukov et al. proposed a formal framework based on m statistically independent approximations. Started by Hermelin et al. in ACISP'08, a different approach was taken by studying m-dimensional combined approximations from m base approximations ...
Nguyen, Phuong Ha   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy