Filters








84 Hits in 7.8 sec

Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming [chapter]

Nicky Mouha, Qingju Wang, Dawu Gu, Bart Preneel
2012 Lecture Notes in Computer Science  
We prove that 38 rounds are sufficient for security against differential cryptanalysis, and 61 rounds for security against linear cryptanalysis.  ...  For modern ciphers, resistance against these attacks is therefore a mandatory design criterion.  ...  Resistance against linear and differential cryptanalysis is a standard design criterion for new ciphers.  ... 
doi:10.1007/978-3-642-34704-7_5 fatcat:s5abixnxxjh5fc2vmcb656cqca

Hybrid Lightweight and Robust Encryption Design for Security in IoT

Abhijit Patil, Gaurav Bansod, Narayan Pisharoty
2015 International Journal of Security and Its Applications  
This hybrid cipher design is secure against linear and differential cryptanalysis.  ...  Column wise substitution and robust S-box design of RECTANGLE will make LED design robust and secure and enables it to provide resistance against any type of attack.  ...  Acknowledgment The authors would like to thank Symbiosis Institute of Technology, Pune, Symbiosis International University, Pune for providing resources to carry out this research successfully.  ... 
doi:10.14257/ijsia.2015.9.12.10 fatcat:eedlw7xhmbadjkay7k3bkfi37a

Design a Secure Hybrid Stream Cipher

Ali H. Kashmar, Eddie S. Ismail, Firdaus M. Hamzah, Haider F. Abdul Amir
2015 International Journal of Applied Physics and Mathematics  
This research proposes the design of a new efficient and secure stream cipher, named BloStream which proves to be more secure than conventional stream ciphers that commonly implement Exclusive-OR (XOR)  ...  for mixing.  ...  a stronger form which is suitable for computer cryptography.  ... 
doi:10.17706/ijapm.2015.5.3.153-166 fatcat:cduykq6bxnabtdqofxhx5cpvqu

Lightweight Cryptography for IoT: A State-of-the-Art [article]

Vishal A. Thakor, M.A. Razzaque, Muhammad R. A. Khandaker
2020 arXiv   pre-print
More than four dozens of lightweight cryptography algorithms have been proposed, designed for specific application(s).  ...  This paper presents the performance comparison along with their reported cryptanalysis, mainly for lightweight block ciphers, and further shows new research directions to develop novel algorithms with  ...  Cost, Performance and Security 1) An efficient masking for a block cipher comes mainly from the S-boxes (by choosing an adequate S-box).  ... 
arXiv:2006.13813v1 fatcat:tydoekhuvrhjtek64z77zw34ti

Analysis of Development of Dynamic S-Box Generation

Amandeep Singh, Praveen Agarwal, Mehar Chand
2017 Computer Science and Information Technology  
In present paper we tried to address dynamic S-Box techniques and provide their analysis on the basis of S-Box properties, which are essential for secure S-Box construction like Non-linearity, XOR profile  ...  But at the same time till date a number of researches have being carried out for making AES more secure by using dynamic S-Boxes to provide more confusion to the cryptanalyst.  ...  First case provides moderate level of security in whcih S-Box rotation is based on only one byte of the round key.  ... 
doi:10.13189/csit.2017.050502 fatcat:ew6saq4cfvhmhmv7dnryfidita

A Survey on Stream Ciphers for Constrained Environments

Alaa Kadhim Farhan
2021 Zenodo  
This survey investigates a detailed flow of the stream ciphers such as algorithm design pattern, key size, internal state, throughput, the vulnerability in security, and the initial vectors for comparison  ...  Therefore, IoT devices must ensure basic security characteristics to protect that information. In this paper, we will make a survey on a solution that used stream cipher in cryptography.  ...  Enocoro utilizes 64-bit IVs and uses an S-box byte-oriented architecture that works well in both hardware and software.  ... 
doi:10.5281/zenodo.5732804 fatcat:5izov35nwzbrzp6nkjgftvqzpy

A Novel Cryptographic Substitution Box Design Using Gaussian Distribution

Muhammad Fahad Khan, Adeel Ahmed, Khalid Saleem
2019 IEEE Access  
In this paper, a novel method is being proposed to construct a substitution box or Boolean function for block ciphers using Gaussian distribution and linear fractional transform.  ...  INDEX TERMS Substitution permutation networks, block cipher, cryptographic confusion, S-box, random number generation, Gaussian distribution, linear fractional transform.  ...  The smaller the DP, the stronger is the ability of the S-box, resisting against differential cryptanalysis attacks.  ... 
doi:10.1109/access.2019.2893176 fatcat:z5q45zbw2zd4fgd5wdv2o2jiki

On the Design of Bit Permutation Based Ciphers - The Interplay Among S-box, Bit Permutation and Key-addition [article]

Sumanta Sarkar, Yu Sasaki, Siang Meng Sim
2020 IACR Cryptology ePrint Archive  
However, designing such ciphers comes with one major challengeto ensure strong cryptographic properties simply depending on the combination of three components, namely S-box, a bit permutation and a key  ...  Bit permutation based block ciphers, like PRESENT and GIFT, are well-known for their extreme lightweightness in hardware implementation.  ...  Acknowledgements The authors would like to thank Thomas Peyrin for the meaningful discussion on the study of TRIFLE-BC.  ... 
dblp:journals/iacr/SarkarSS20 fatcat:gf6ybgsp7vh5rkrfh6o3xwffi4

Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V [article]

Jin Hoki, Takanori Isobe, Ryoma Ito, Fukang Liu, Kosei Sakamoto
2021 IACR Cryptology ePrint Archive  
By carefully choosing the IV values and differences, we can construct practical bit-wise differential distinguishers for the 4-round SNOW-V, 4-, and 5-round SNOW-Vi with time complexities of 2 4.466 ,  ...  Then, we consider single-bit and dual-bit differential cryptanalysis, which is inspired by the existing study on Salsa and ChaCha.  ...  Kosei Sakamoto is supported by Grant-in-Aid for JSPS Fellows (KAKENHI 20J23526) for Japan Society for  ... 
dblp:journals/iacr/HokiIILS21 fatcat:ncpomdnmzzhhrneblq3yrkdn6m

The New Block Cipher Design (Tigris Cipher)

Omar A. Dawood, Abdul Monem S. Rahma, Abdul Mohsen J. Abdul Hossen
2015 International Journal of Computer Network and Information Security  
The Tigris cipher construction strategy includes the adoption of construction a new S-box with high nonlinearity that uses the same routines of the AES-S-box stage but with different modular arithmetic  ...  In the present paper we have proposed a new variant of AES cipher with high level of security and an elegant construction called TIGRIS cipher.  ...  Muarich for his great contribution in editing and proof reading this paper from a linguistic point of view.  ... 
doi:10.5815/ijcnis.2015.12.02 fatcat:lpkrfkc65zh5nokghtsvuw4o2e

Impossible differential cryptanalysis using matrix method

Jongsung Kim, Seokhie Hong, Jongin Lim
2010 Discrete Mathematics  
We expect that the matrix method developed in this article will be useful for evaluating the security of block ciphers against impossible differential cryptanalysis, especially when one tries to design  ...  Lim). 1 Independently from the Nyberg-Knudsen method, in 1998, Vaudenay proposed another method for provable security against differential and linear cryptanalysis based on the decorrelation theory [18  ...  So, designers have tried to build block ciphers secure against differential and linear cryptanalysis.  ... 
doi:10.1016/j.disc.2009.10.019 fatcat:4tqctfccqjbnblnb7wvcgw6bum

Encryption and decryption techniques for video data: a survey [chapter]

Jeba Praba John
2015 Zenodo  
ABSTRACT: In recent years there has been an increasing interest in using the technology of multimedia. The privacy and security of data are challenging tasks, during transmission time.  ...  In this era there are many of the encryption algorithms and techniques are present for secure data transmission, but the main concern is security level, speed, stream size, quality and efficiency of encryption  ...  SEED uses two 8x8 S-boxes and mixes the XOR operation with modular addition. It has been designed to resist differential and linear cryptanalysis as well as related key attacks.  ... 
doi:10.5281/zenodo.4383715 fatcat:t3qfbbogz5glzjesbvgr2btnle

An Innovative Kind Of Security Protocol Using Fusion Encryption In Virtual Private Networking

Mohammad Sreedevi
2012 International Journal of Distributed and Parallel systems  
We propose new type of fusion encryption technique using AES for encryption and decryption and RSA used for key management.  ...  for MPPE.  ...  The Wide Trial Strategy design method provides resistance against linear and differential cryptanalysis. In the Wide Trail Strategy, every layer has its own function: iii.  ... 
doi:10.5121/ijdps.2012.3116 fatcat:76uazoq2yvhsbfcbmsise6i4cu

SITM: See-In-The-Middle Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers

Shivam Bhasin, Jakub Breier, Xiaolu Hou, Dirmanto Jap, Romain Poussier, Siang Meng Sim
2019 Transactions on Cryptographic Hardware and Embedded Systems  
In this paper, we present a methodology for side-channel assisted differential cryptanalysis attack to target middle rounds of block cipher implementations.  ...  Such method presents a powerful attack vector against designs that normally only protect the beginning and end rounds of ciphers.  ...  Following the indexing used by the designers (which is different from AES), the cells (4-bit nibble for SKINNY-64 or 8-bit byte for SKINNY-128) in the SKINNY state are labeled row-wise from top to bottom  ... 
doi:10.13154/tches.v2020.i1.95-122 dblp:journals/tches/BhasinBHJPS20 fatcat:vl3nwjuqafhgjhc7mh55hvgzdu

The Whirlpool Secure Hash Function

William Stallings
2006 Cryptologia  
In this paper, we describe Whirlpool, which is a block-cipher-based secure hash function. Whirlpool produces a hash code of 512 bits for an input message of maximum length less than 2 256 bits.  ...  The underlying block cipher, based on the Advanced Encryption Standard (AES), takes a 512-bit key and operates on 512-bit blocks of plaintext.  ...  These two properties help to make W resistant against linear and differential cryptanalysis.  ... 
doi:10.1080/01611190500380090 fatcat:4qza46i66zhr3ma7blcipa65ou
« Previous Showing results 1 — 15 out of 84 results