Filters








523 Hits in 4.2 sec

Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security [chapter]

David A. McGrew, Scott R. Fluhrer
2001 Lecture Notes in Computer Science  
We conclude with observations on the use of stream ciphers for Internet security.  ...  We present and analyze attacks on additive stream ciphers that rely on linear equations that hold with non-trivial probability in plaintexts that are encrypted using distinct keys.  ...  In order to attack additive encryption of linearly redundant plaintext, we define a hallmark of a key.  ... 
doi:10.1007/3-540-44983-3_2 fatcat:vjcms7l5bvcdpltjwwuff65jqi

Introduction to Cryptology [chapter]

2011 RC4 Stream Cipher and Its Variants  
It reviews the different type of algorithms for encryption and authentication and explains the principles of stream ciphers, block ciphers, hash functions, public-key encryption algorithms, and digital  ...  This paper provides an overview of the state of the art in the design of cryptographic algorithms.  ...  An attacker, who does not know S A , sees only the image of the plaintext under a one-way function, and will not be able to recover the plaintext.  ... 
doi:10.1201/b11310-2 fatcat:3l6quccelrc7vcjhcebo23do6u

An Introduction to Cryptology [chapter]

Bart Preneel
1998 Lecture Notes in Computer Science  
It reviews the different type of algorithms for encryption and authentication and explains the principles of stream ciphers, block ciphers, hash functions, public-key encryption algorithms, and digital  ...  This paper provides an overview of the state of the art in the design of cryptographic algorithms.  ...  An attacker, who does not know S A , sees only the image of the plaintext under a one-way function, and will not be able to recover the plaintext.  ... 
doi:10.1007/3-540-49477-4_14 fatcat:qkgt2cjlkjf7pkqyrrtgqrej6e

Overview on Selective Encryption of Image and Video: Challenges and Perspectives

A. Massoudi, F. Lefebvre, C. De Vleeschouwer, B. Macq, J.-J. Quisquater
2008 EURASIP Journal on Information Security  
The aim of selective encryption is to reduce the amount of data to encrypt while preserving a sufficient level of security.  ...  In addition, selective encryption allows preserving some codec functionalities such as scalability. This tutorial is intended to give an overview on selective encryption algorithms.  ...  entropy, and ris the plaintext redundancy.  ... 
doi:10.1155/2008/179290 fatcat:edxyot6bf5dshmhltumubf7fru

Cryptanalysis of the cellular message encryption algorithm [chapter]

David Wagner, Bruce Schneier, John Kelsey
1997 Lecture Notes in Computer Science  
We describe an attack on CMEA which requires 40-80 known plaintexts, has time complexity about 2 24 -2 32 , and finishes in minutes or hours of computation on a standard workstation.  ...  This paper analyzes the Telecommunications Industry Association's Cellular Message Encryption Algorithm (CMEA), which is used for confidentiality of the control channel in the most recent American digital  ...  In addition, our analysis also shows the importance of explicitly stating security assumptions during every step of the design and development process, and of not reusing security components without throroughly  ... 
doi:10.1007/bfb0052260 fatcat:q4l55vryj5d5biomrlcnaloioi

Cryptography for Network Security: Failures, Successes and Challenges [chapter]

Bart Preneel
2010 Lecture Notes in Computer Science  
and their implementations.  ...  This article discusses the state of the art of cryptographic algorithms as deployed for securing computing networks.  ...  This work was partially funded by the European Commission through the IST Programme under Contract ICT-2007-216676 ECRYPT II and by the Belgian Government through the IUAP Programme under contract P6/26  ... 
doi:10.1007/978-3-642-14706-7_4 fatcat:hzrbqmkyuzc2hiz3jf6whoxelu

Information Leakage in Encrypted Deduplication via Frequency Analysis: Attacks and Defenses [article]

Jingwei Li and Patrick P. C. Lee and Chufeng Tan and Chuan Qin and Xiaosong Zhang
2019 arXiv   pre-print
We conduct trace-driven evaluation on both real-world and synthetic datasets and show that our proposed attacks infer a significant fraction of plaintext chunks under backup workloads.  ...  Encrypted deduplication combines encryption and deduplication to simultaneously achieve both data security and storage efficiency.  ...  One security implication of our inference attacks is that they can identify critical chunks in an encrypted backup snapshot.  ... 
arXiv:1904.05736v2 fatcat:x4faydsbzfhl7g5txexd6irk7u

A resource-efficient multimedia encryption scheme for embedded video sensing system based on unmanned aircraft

Chen Xiao, Lifeng Wang, Mengjiao Zhu, Wendong Wang
2016 Journal of Network and Computer Applications  
In addition, theoretical analyses based on information theory and experimental analyses on throughputs show that the proposed encryption schemes can meet the real-time requirements of system under the  ...  Meanwhile, the computation and energy resources in such system are very limited, which restricts the use of complex encryption process on video data.  ...  Acknowledgments This work was partially supported by the National Natural Science Foundation of China (Grant no. 61300182 and 61370197), and the Fundamental Research Funds for the Central Universities  ... 
doi:10.1016/j.jnca.2015.06.021 fatcat:wfn5fbkx4zbxbmomavedpsrqry

A Survey of Homomorphic Encryption for Outsourced Big Data Computation

2016 KSII Transactions on Internet and Information Systems  
Existing works on homomorphic encryption are technically reviewed and compared in terms of their encryption scheme, homomorphism classification, algorithm design, noise management, and security assumption  ...  However, this outsourced initiative introduces a number of security and privacy concerns.  ...  The author also thanks the anonymous reviewers of the paper for their careful reviews and valuable comments  ... 
doi:10.3837/tiis.2016.08.022 fatcat:plj6fns2l5b6xilzr3kmr3sw4u

Bug Attacks

Eli Biham, Yaniv Carmeli, Adi Shamir
2015 Journal of Cryptology  
, such bugs can be a security disaster: Decrypting ciphertexts on any computer which multiplies even one pair of numbers incorrectly can lead to full leakage of the secret key, sometimes with a single  ...  In this paper we present a new kind of cryptanalytic attack which utilizes bugs in the hardware implementation of computer instructions.  ...  The first two authors were supported in part by the Israel MOD Research and Technology Unit.  ... 
doi:10.1007/s00145-015-9209-1 fatcat:dxc4rzeskbcqre6mn4z5kihmda

Fault-based attacks on cryptographic hardware

I. Polian, M. Kreuzer
2013 2013 IEEE 16th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS)  
They circumvent the protection by inducing faults into the hardware implementation of cryptographic functions, thus affecting encryption and/or decryption in a controlled way.  ...  In the recent years, a large number of fault-based attacks and countermeasures to protect cryptographic circuits against them have been developed.  ...  Recall that one fault-free encryption and one encryption with fault injection were performed and the respective ciphertexts C and C have been recorded.  ... 
doi:10.1109/ddecs.2013.6549781 dblp:conf/ddecs/PolianK13 fatcat:463ms2z3draxdkuox4i72ib7fi

Forking a Blockcipher for Authenticated Encryption of Very Short Messages [article]

Elena Andreeva, Reza Reyhanitabar, Kerem Varici, Damian Vizár
2018 IACR Cryptology ePrint Archive  
In the recent post-CAESAR era, it became clear that authenticated encryption optimized for short messages is a research problem that is both highly relevant, and not yet fully solved.  ...  The concept of forkcipher, a new kind of cryptographic primitive, has been proposed as a mean to sidestep the overcome the limitations of AE schemes based on typical primitives (such as blockciphers).  ...  Elena Andreeva was supported in part by the Research Council KU Leuven C1 on Security and Privacy for Cyber-Physical Systems and the Internet of Things with contract number C16/15/058 and by the Research  ... 
dblp:journals/iacr/AndreevaRVV18 fatcat:5f6zwcawgzhzrlsduv67ukotzq

Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication

Elad Barkan, Eli Biham, Nathan Keller
2007 Journal of Cryptology  
These attacks are based on security flaws of the GSM protocols, and work whenever the mobile phone supports A5/2.  ...  In this paper we present a very practical ciphertext-only cryptanalysis of GSM encrypted communication, and various active attacks on the GSM protocols.  ...  We are grateful to Orr Dunkelman for his great help and various comments on early versions of this paper, and to Adi Shamir for his advice and useful remarks.  ... 
doi:10.1007/s00145-007-9001-y fatcat:2nyg3trnsrhtbhnfhlpzj34l5m

Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication [chapter]

Elad Barkan, Eli Biham, Nathan Keller
2003 Lecture Notes in Computer Science  
These attacks are based on security flaws of the GSM protocols, and work whenever the mobile phone supports A5/2.  ...  In this paper we present a very practical ciphertext-only cryptanalysis of GSM encrypted communication, and various active attacks on the GSM protocols.  ...  We are grateful to Orr Dunkelman for his great help and various comments on early versions of this paper, and to Adi Shamir for his advice and useful remarks.  ... 
doi:10.1007/978-3-540-45146-4_35 fatcat:z3g5o2ztnrculmmhpt7l5q46xe

Page 8755 of Mathematical Reviews Vol. , Issue 2002K [page]

2002 Mathematical Reviews  
McGrew and Scott R. Fluhrer, Attacks on additive encryption of redundant plaintext and implications on internet security (14— 28); A. M.  ...  On the implemen- tation of cryptosystems based on real quadratic number fields (extended abstract) (288-302); Kaoru Kurosawa, Tetsu Iwata and Viet Duong Quang, Root finding interpolation attack (303-314  ... 
« Previous Showing results 1 — 15 out of 523 results