A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming
[chapter]
2012
Lecture Notes in Computer Science
We prove that 38 rounds are sufficient for security against differential cryptanalysis, and 61 rounds for security against linear cryptanalysis. ...
For modern ciphers, resistance against these attacks is therefore a mandatory design criterion. ...
Resistance against linear and differential cryptanalysis is a standard design criterion for new ciphers. ...
doi:10.1007/978-3-642-34704-7_5
fatcat:s5abixnxxjh5fc2vmcb656cqca
Hybrid Lightweight and Robust Encryption Design for Security in IoT
2015
International Journal of Security and Its Applications
This hybrid cipher design is secure against linear and differential cryptanalysis. ...
Column wise substitution and robust S-box design of RECTANGLE will make LED design robust and secure and enables it to provide resistance against any type of attack. ...
Acknowledgment The authors would like to thank Symbiosis Institute of Technology, Pune, Symbiosis International University, Pune for providing resources to carry out this research successfully. ...
doi:10.14257/ijsia.2015.9.12.10
fatcat:eedlw7xhmbadjkay7k3bkfi37a
Design a Secure Hybrid Stream Cipher
2015
International Journal of Applied Physics and Mathematics
This research proposes the design of a new efficient and secure stream cipher, named BloStream which proves to be more secure than conventional stream ciphers that commonly implement Exclusive-OR (XOR) ...
for mixing. ...
a stronger form which is suitable for computer cryptography. ...
doi:10.17706/ijapm.2015.5.3.153-166
fatcat:cduykq6bxnabtdqofxhx5cpvqu
Lightweight Cryptography for IoT: A State-of-the-Art
[article]
2020
arXiv
pre-print
More than four dozens of lightweight cryptography algorithms have been proposed, designed for specific application(s). ...
This paper presents the performance comparison along with their reported cryptanalysis, mainly for lightweight block ciphers, and further shows new research directions to develop novel algorithms with ...
Cost, Performance and Security 1) An efficient masking for a block cipher comes mainly from the S-boxes (by choosing an adequate S-box). ...
arXiv:2006.13813v1
fatcat:tydoekhuvrhjtek64z77zw34ti
Analysis of Development of Dynamic S-Box Generation
2017
Computer Science and Information Technology
In present paper we tried to address dynamic S-Box techniques and provide their analysis on the basis of S-Box properties, which are essential for secure S-Box construction like Non-linearity, XOR profile ...
But at the same time till date a number of researches have being carried out for making AES more secure by using dynamic S-Boxes to provide more confusion to the cryptanalyst. ...
First case provides moderate level of security in whcih S-Box rotation is based on only one byte of the round key. ...
doi:10.13189/csit.2017.050502
fatcat:ew6saq4cfvhmhmv7dnryfidita
A Survey on Stream Ciphers for Constrained Environments
2021
Zenodo
This survey investigates a detailed flow of the stream ciphers such as algorithm design pattern, key size, internal state, throughput, the vulnerability in security, and the initial vectors for comparison ...
Therefore, IoT devices must ensure basic security characteristics to protect that information. In this paper, we will make a survey on a solution that used stream cipher in cryptography. ...
Enocoro utilizes 64-bit IVs and uses an S-box byte-oriented architecture that works well in both hardware and software. ...
doi:10.5281/zenodo.5732804
fatcat:5izov35nwzbrzp6nkjgftvqzpy
A Novel Cryptographic Substitution Box Design Using Gaussian Distribution
2019
IEEE Access
In this paper, a novel method is being proposed to construct a substitution box or Boolean function for block ciphers using Gaussian distribution and linear fractional transform. ...
INDEX TERMS Substitution permutation networks, block cipher, cryptographic confusion, S-box, random number generation, Gaussian distribution, linear fractional transform. ...
The smaller the DP, the stronger is the ability of the S-box, resisting against differential cryptanalysis attacks. ...
doi:10.1109/access.2019.2893176
fatcat:z5q45zbw2zd4fgd5wdv2o2jiki
On the Design of Bit Permutation Based Ciphers - The Interplay Among S-box, Bit Permutation and Key-addition
[article]
2020
IACR Cryptology ePrint Archive
However, designing such ciphers comes with one major challengeto ensure strong cryptographic properties simply depending on the combination of three components, namely S-box, a bit permutation and a key ...
Bit permutation based block ciphers, like PRESENT and GIFT, are well-known for their extreme lightweightness in hardware implementation. ...
Acknowledgements The authors would like to thank Thomas Peyrin for the meaningful discussion on the study of TRIFLE-BC. ...
dblp:journals/iacr/SarkarSS20
fatcat:gf6ybgsp7vh5rkrfh6o3xwffi4
Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V
[article]
2021
IACR Cryptology ePrint Archive
By carefully choosing the IV values and differences, we can construct practical bit-wise differential distinguishers for the 4-round SNOW-V, 4-, and 5-round SNOW-Vi with time complexities of 2 4.466 , ...
Then, we consider single-bit and dual-bit differential cryptanalysis, which is inspired by the existing study on Salsa and ChaCha. ...
Kosei Sakamoto is supported by Grant-in-Aid for JSPS Fellows (KAKENHI 20J23526) for Japan Society for ...
dblp:journals/iacr/HokiIILS21
fatcat:ncpomdnmzzhhrneblq3yrkdn6m
The New Block Cipher Design (Tigris Cipher)
2015
International Journal of Computer Network and Information Security
The Tigris cipher construction strategy includes the adoption of construction a new S-box with high nonlinearity that uses the same routines of the AES-S-box stage but with different modular arithmetic ...
In the present paper we have proposed a new variant of AES cipher with high level of security and an elegant construction called TIGRIS cipher. ...
Muarich for his great contribution in editing and proof reading this paper from a linguistic point of view. ...
doi:10.5815/ijcnis.2015.12.02
fatcat:lpkrfkc65zh5nokghtsvuw4o2e
Impossible differential cryptanalysis using matrix method
2010
Discrete Mathematics
We expect that the matrix method developed in this article will be useful for evaluating the security of block ciphers against impossible differential cryptanalysis, especially when one tries to design ...
Lim). 1 Independently from the Nyberg-Knudsen method, in 1998, Vaudenay proposed another method for provable security against differential and linear cryptanalysis based on the decorrelation theory [18 ...
So, designers have tried to build block ciphers secure against differential and linear cryptanalysis. ...
doi:10.1016/j.disc.2009.10.019
fatcat:4tqctfccqjbnblnb7wvcgw6bum
Encryption and decryption techniques for video data: a survey
[chapter]
2015
Zenodo
ABSTRACT: In recent years there has been an increasing interest in using the technology of multimedia. The privacy and security of data are challenging tasks, during transmission time. ...
In this era there are many of the encryption algorithms and techniques are present for secure data transmission, but the main concern is security level, speed, stream size, quality and efficiency of encryption ...
SEED uses two 8x8 S-boxes and mixes the XOR operation with modular addition. It has been designed to resist differential and linear cryptanalysis as well as related key attacks. ...
doi:10.5281/zenodo.4383715
fatcat:t3qfbbogz5glzjesbvgr2btnle
An Innovative Kind Of Security Protocol Using Fusion Encryption In Virtual Private Networking
2012
International Journal of Distributed and Parallel systems
We propose new type of fusion encryption technique using AES for encryption and decryption and RSA used for key management. ...
for MPPE. ...
The Wide Trial Strategy design method provides resistance against linear and differential cryptanalysis. In the Wide Trail Strategy, every layer has its own function: iii. ...
doi:10.5121/ijdps.2012.3116
fatcat:76uazoq2yvhsbfcbmsise6i4cu
SITM: See-In-The-Middle Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers
2019
Transactions on Cryptographic Hardware and Embedded Systems
In this paper, we present a methodology for side-channel assisted differential cryptanalysis attack to target middle rounds of block cipher implementations. ...
Such method presents a powerful attack vector against designs that normally only protect the beginning and end rounds of ciphers. ...
Following the indexing used by the designers (which is different from AES), the cells (4-bit nibble for SKINNY-64 or 8-bit byte for SKINNY-128) in the SKINNY state are labeled row-wise from top to bottom ...
doi:10.13154/tches.v2020.i1.95-122
dblp:journals/tches/BhasinBHJPS20
fatcat:vl3nwjuqafhgjhc7mh55hvgzdu
The Whirlpool Secure Hash Function
2006
Cryptologia
In this paper, we describe Whirlpool, which is a block-cipher-based secure hash function. Whirlpool produces a hash code of 512 bits for an input message of maximum length less than 2 256 bits. ...
The underlying block cipher, based on the Advanced Encryption Standard (AES), takes a 512-bit key and operates on 512-bit blocks of plaintext. ...
These two properties help to make W resistant against linear and differential cryptanalysis. ...
doi:10.1080/01611190500380090
fatcat:4qza46i66zhr3ma7blcipa65ou
« Previous
Showing results 1 — 15 out of 84 results