37 Hits in 5.8 sec

FNR: Arbitrary Length Small Domain Block Cipher Proposal [chapter]

Sashank Dara, Scott Fluhrer
2014 Lecture Notes in Computer Science  
We propose a practical flexible (or arbitrary) length small domain block cipher, FNR encryption scheme. FNR denotes Flexible Naor and Reingold.  ...  It can cipher small domain data formats like IPv4, Port numbers, MAC Addresses, Credit card numbers, any random short strings while preserving their input length.  ...  Expansion of ciphertext length may be undesirable for said reasons. Small domain block ciphers are useful tool in designing privacy of sensitive data fields of smaller length (<128 bits).  ... 
doi:10.1007/978-3-319-12060-7_10 fatcat:boihyihjs5b55llhnm4e4ijudq

Efficient Format Preserving encrypted databases

Prakruti Chandrashekar, Sashank Dara, V. N. Muralidhara
2015 2015 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)  
We propose storage efficient SQL-aware encrypted databases that preserve the format of the fields. We give experimental results of storage improvements in CryptDB using FNR encryption scheme.  ...  Here both c, p are in same domain. FNR is a arbitrary length small domain block cipher proposed in [3] .  ...  FNR scheme could be used to preserve the format and length of arbitrary length small domain sensitive data like MAC addresses, IPV4(32), IPV6(32) etc.  ... 
doi:10.1109/conecct.2015.7383885 fatcat:uzytqacs25divil3ocdpypnshm

Efficient Masking of ARX-Based Block Ciphers Using Carry-Save Addition on Boolean Shares [chapter]

Daniel Dinu, Johann Großschädl, Yann Le Corre
2017 Lecture Notes in Computer Science  
Masking is a widely-used technique to protect block ciphers and other symmetric cryptosystems against Differential Power Analysis (DPA) attacks.  ...  Supported by FNR Luxembourg (CORE project ACRYPT, ID C12-15-4009992).  ...  This idea was originally proposed for hardware implementation [1] , but can also be applied to protect software implementations of ARX-based block ciphers against DPA as demonstrated in [12] .  ... 
doi:10.1007/978-3-319-69659-1_3 fatcat:uweahyajcjhdlmy2daiewhacs4

A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks [chapter]

François-Xavier Standaert, Tal G. Malkin, Moti Yung
2009 Lecture Notes in Computer Science  
It is illustratively applied to block ciphers, although it could be used to analyze a larger class of cryptosystems.  ...  François-Xavier Standaert is a post doctoral researcher funded by the FNRS (Funds for  ...  Target block cipher A block cipher transforms a plaintext block P of a fixed bit length n b into a ciphertext block C of the same length, under the influence of a cipher key K, of bit length n k .  ... 
doi:10.1007/978-3-642-01001-9_26 fatcat:yb6h5btb4fhhpg7ffgw5gdrph4

Efficient Masked S-Boxes Processing – A Step Forward – [chapter]

Vincent Grosso, Emmanuel Prouff, François-Xavier Standaert
2014 Lecture Notes in Computer Science  
To defeat side-channel attacks, the implementation of block cipher algorithms in embedded devices must include dedicated countermeasures.  ...  In this paper, we focus on the scheme proposed by Carlet et al at FSE 2012, and latter improved by Roy and Vivek at CHES 2013.  ...  Standaert is an associate researcher of the Belgian Fund for Scientific Research (FNRS-F.R.S.). We also thank Jean-Sébastien Coron for pointing us out the minimization strategy discussed in Remark 3.  ... 
doi:10.1007/978-3-319-06734-6_16 fatcat:axaxtptuqjdrffxlwiogm4fkgm

Mathematical Aspects of Division Property [article]

Phil Hebborn, Gregor Leander, Aleksei Udovenko
2022 IACR Cryptology ePrint Archive  
ciphers.  ...  This work surveys mathematical aspects of division property, which is a state of the art technique in cryptanalysis of symmetric-key algorithms, such as authenticated encryption, block ciphers and stream  ...  Acknowledgements The authors thank Claude Carlet for proposing the idea of this survey.  ... 
dblp:journals/iacr/HebbornLU22 fatcat:ej7tftjjubdq3odbz7pql4pvci

Steganography and Steganalysis in Voice over IP: A Review

Zhijun Wu, Junjun Guo, Chenlei Zhang, Changliang Li
2021 Sensors  
This technique greatly enhances the detection of accurateness under any embedding rate and with arbitrary sample length [1] .  ...  , 4 m-b: modle-based, 5 avi: audio, video and image, 6 dp: data protection, 7 dian: data integrity, authentication and non-repudiation, 8 trscbc: transposition, replacement, stream cipher, block cipher  ... 
doi:10.3390/s21041032 pmid:33546240 pmcid:PMC7913304 fatcat:6b5ocz5rajhzzooh345couyjaq

Leakage-Resilient and Misuse-Resistant Authenticated Encryption [article]

Francesco Berti, François Koeune, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2016 IACR Cryptology ePrint Archive  
Next, we argue that full misuse-resistance with leakage may be impossible to achieve with simple primitives such as hash functions and block ciphers.  ...  -FNRS). This work has been funded in parts by the FNRS, the INNOVIRIS projects SCAUT and C-Cure, the ARC project NANOSEC and the ERC project 280141.  ...  A L gets access to a leaking encryption oracle that, when queried on a message m of arbitrary block length, returns Enc k (m) together with the leakage resulting from the encryption process. 3.  ... 
dblp:journals/iacr/BertiKPPS16 fatcat:thdpo3nud5fe3fgbwzk5v7on4u

Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction

Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2020 IACR Transactions on Symmetric Cryptology  
Based on this, we propose a new 1-pass AE mode TETSponge, which carefully combines a tweakable block cipher that must have strong protections against side-channel attacks and is scarcely used, and a duplex-style  ...  To address this challenge, our first contribution is to investigate the leakage-resistance of a generic duplex-based stream cipher.  ...  -FNRS). This work has been funded in parts by the European Union through the ERC project SWORD (724725), and the European Union and Walloon Region FEDER USERMedia project 501907-379156.  ... 
doi:10.13154/tosc.v2020.i1.6-42 dblp:journals/tosc/GuoPPS20 fatcat:rqfvudal2re6znqzn7umrtdxnm

TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications [article]

Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2019 IACR Cryptology ePrint Archive  
We propose TEDT, a new Authenticated Encryption with Associated Data (AEAD) mode leveraging Tweakable Block Ciphers (TBCs).  ...  Thomas Peters and Franc ¸ois-Xavier Standaert are respectively postdoctoral researcher and senior associate researcher of the Belgian Fund for Scientific Research (FNRS-F.R.S.).  ...  A block cipher which is sampled uniformly at random from the set of all block ciphers with corresponding key space and domain is called an ideal cipher.  ... 
dblp:journals/iacr/BertiGPPS19 fatcat:ua3js7itxbh2rnekv3erffkhti

Multiresolution dendritic cell algorithm for network anomaly detection

David Limon-Cantu, Vicente Alarcon-Aquino
2021 PeerJ Computer Science  
The proposed MRA S-dDCA model achieved an accuracy of 97.37%, 99.97%, 99.56%, and 99.75% for the tested datasets, respectively.  ...  The proposed model was inspired by the behavior of dendritic cells and their interactions with the human immune system, known as Dendritic Cell Algorithm (DCA), and combines the use of Multiresolution  ...  UNSW-NB15, CIC-IDS2017, CSE-CIC-IDS2018 Generic A technique that works against all block ciphers (encryption method) without consideration of its structure.  ... 
doi:10.7717/peerj-cs.749 pmid:34805504 pmcid:PMC8576553 fatcat:v7h64sld7zbedeu4nro3h5nhgy

Detecting visually similar Web pages

Teh-Chung Chen, Scott Dick, James Miller
2010 ACM Transactions on Internet Technology  
We apply our new approach to the domain of anti-Phishing technologies, which at once gives us both a reasonable ground truth for the concept of "visually similar," and a high-value application of our proposed  ...  Although other heuristic analysis methods such as domain registration lifetime checking are proposed and deployed in the toolbars, the Phishers still can find a way to fool classifiers built on these  ...  Our proposed method which identifies the Phishing websites via its visual similarity provides a new approach to this area.  ... 
doi:10.1145/1754393.1754394 fatcat:3fsxye6xzrgvnd76ria3lozdze

Towards Lightweight Side-Channel Security and the Leakage-Resilience of the Duplex Sponge [article]

Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2019 IACR Cryptology ePrint Archive  
Based on this, we propose a new 1-pass AE mode TETSponge, which carefully combines a tweakable block cipher that must have strong protections against side-channel attacks and is scarcely used, and a duplex-style  ...  To address this challenge, we investigate the leakageresistance of a generic duplex-based stream cipher, and prove the classical bound, i.e., ≈ 2 c/2 , under an assumption of non-invertible leakage.  ...  -FNRS).  ... 
dblp:journals/iacr/GuoPPS19 fatcat:tyh5rkjpnveybmk4sgft7awytq

Color Based Image Retrieval System

Pawandeep Kaur
2012 IOSR Journal of Computer Engineering  
It has been proved that if the key, that is One Time Pad, is unique then the cipher text cannot be broken. m1 m2… is operated on by a binary key string k1k2….kt of the same length to produce a cipher  ...  Segments the image into blocks and then to obtain a color histogram for each block.  ...  system security policies, if abnormal patterns or unauthorized access is being suspected .However, there are two potential mistakes by IDS, namely, false positive error (FPE) and false negative error (FNR  ... 
doi:10.9790/0661-0150105 fatcat:lwr43nrwu5b6dap3lv5gkm5me4

Efficient Lifting for Shorter Zero-Knowledge Proofs and Post-Quantum Signatures [article]

Daniel Kales, Greg Zaverucha
2022 IACR Cryptology ePrint Archive  
Using a combination of these strategies at different points in the protocol, we design two new proof systems well suited to small circuits defined over small fields.  ...  In recent proofs the soundness depends on the size F, and small fields require more parallel repetitions, and therefore produce larger proofs.  ...  This generalizes to OWFs based on Even-Mansour (EM) block ciphers.  ... 
dblp:journals/iacr/KalesZ22 fatcat:6w2juril65e4rkgr235lql5bli
« Previous Showing results 1 — 15 out of 37 results