Using Simon's algorithm to attack symmetric-key cryptographic primitives [PDF]
We present new connections between quantum information and the field of classical cryptography. In particular, we provide examples where Simon’s algorithm can be used to show insecurity of commonly used cryptographic symmetric-key primitives. Specifically, these examples consist of a quantum distinguisher for the 3-round Feistel network and a forgery ...
Thomas Santoli, Christian Schaffner
openalex +6 more sources
A Symmetric Key Cryptographic Algorithm [PDF]
Ms Ayushi
openalex +2 more sources
RETRACTED: The Application of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks
This article has been retracted: please see Elsevier Policy on Article Withdrawal (http://www.elsevier.com/locate/withdrawalpolicy).This article has been retracted at the request of the Publisher.The authors have plagiarized a paper that had already appeared in “Queen's 25th Biennial Symposium on Communications”, page 168-172, print ISBN 978-1-4244 ...
Lingling Si, Zhigang Ji, Zhihui Wang
openalex +3 more sources
A Symmetric Key Based Steganography Algorithm for Secured Data Transfer [PDF]
Steganography is the art of hiding information efficiently into another media. It serves as a better way of securing message than cryptography which only conceals the content of the information. Original message is being hidden within a carrier such that the changes so occurred in the carrier are not observable.
Sandipan Debnath
openalex +2 more sources
Neural network-based symmetric encryption algorithm with encrypted traffic protocol identification [PDF]
Cryptography is a cornerstone of power grid security, with the symmetry and asymmetry of cryptographic algorithms directly influencing the resilience of power systems against cyberattacks.
Jiakai Hao +3 more
doaj +3 more sources
An Alphanumeric Symmetric Key Cryptography Algorithm for Fast and Secure Enciphering [PDF]
Suraj Verma, Ashish Agrawal
openalex +2 more sources
Statistical cryptanalyses of symmetric-key algorithms.
This document is essentially presenting results on statistical cryptanalyses of iterative block ciphers. Nevertheless, some results may be applied to other situations like stream cipher cryptanalysis or side channel attacks, ... After a short recall of the basics required for the understanding of the document, we focus on the two main families of ...
Benoît Gérard
openalex +3 more sources
Efficient Implementation of PRESENT and GIFT on Quantum Computers
Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key ...
Kyungbae Jang +5 more
doaj +1 more source
Anti-attacks encryption algorithm based on DNA computing and data encryption standard
Data Encryption Standard (DES) is the first 56-bits secret-key standard that is widely used as a symmetric-key 64-bits block encryption/decryption algorithm. Unfortunately, the rapid increase in computing power makes it possible to find the required bits
Tarek Hagras +2 more
doaj +1 more source
PRISEC: Comparison of Symmetric Key Algorithms for IoT Devices [PDF]
With the growing number of heterogeneous resource-constrained devices connected to the Internet, it becomes increasingly challenging to secure the privacy and protection of data. Strong but efficient cryptography solutions must be employed to deal with this problem, along with methods to standardize secure communications between these devices.
Saraiva, Daniel +5 more
openaire +6 more sources

