7 Hits in 3.2 sec

Slide Attack on Spectr-H64 [chapter]

Selçuk Kavut, Melek D. Yücel
2002 Lecture Notes in Computer Science  
in the round transformation of Spectr-H64.  ...  We compare one round diffusion characteristics of the block cipher Spectr-H64 to those of AES-Rijndael and Safer K-64, in terms of the Avalanche Weight Distribution (AWD) criterion and observe a weakness  ...  Breaking One Round of Spectr-H64 Our idea to break one round of Spectr-H64 is based upon the influential work on differential cryptanalysis [4, 5] .  ... 
doi:10.1007/3-540-36231-2_4 fatcat:aotk7ptjlfhihivrsla72mrjsu

High Speed Networking Security: Design and Implementation of Two New DDP-Based Ciphers

N. Sklavos, N.A. Moldovyan, O. Koufopavlou
2005 Journal on spesial topics in mobile networks and applications  
The achieved hardware performance and the implementation area cost of Cobra-H64 and Cobra-H128 are compared with other ciphers, used in security layers of wireless protocols (Bluetooth, WAP, OMA, UMTS  ...  The designed ciphers operate efficiently with different plaintext lengths, 64 and 128-bit, for Cobra-H64 and Cobra-H128, respectively.  ...  Security estimation of the DDP-based ciphers CIKS-1 [11] and SPECTR-H64 [10] against linear cryptanalysis has shown that DDP are efficient, provided they are combined with other non-linear operations  ... 
doi:10.1023/b:mone.0000048556.51292.31 fatcat:otltzob5tjbi7lfltzyvsgnddi

On Software Implementation of Fast DDP-based Ciphers

Nikolay A. Moldovyan, Peter A. Moldovyanu, Douglas H. Summerville
2007 International Journal of Network Security  
Different types of fast software and firmware encryption algorithms combining DDP with fast arithmetic operations are described.  ...  Presented results show the ciphers are secure against differential analysis. Other attacks are also considered.  ...  Acknowledgement This work was carried out as part of the AFRL funded project #1994p which supported the authors.  ... 
dblp:journals/ijnsec/MoldovyanMS07 fatcat:66h2y5kqnzfntdajynblvv4kk4

Hybrid Model in the Block Cipher Applications for High-speed Communications Networks

Minh Nguyen Hieu, Bac Do Thi, Canh Hoang Ngoc, Manh Cong Tran, Phan Duong Phuc, Khoa Nguyen Tuan
2020 International Journal of Computer Networks & Communications  
Each design has a specific strength that makes the selection more compatible with the objectives of each particular application.  ...  The designs match the limited environment of the wireless network by integrating effectively when implemented on Field-programmable gate array (FPGA) with both iterative and pipeline architectures for  ...  ACKNOWLEDGMENTS This research was supported by the project "Research, design and fabrication of IoT gateway devices integrated for the security solution in the IoT platform and applied for the air quality  ... 
doi:10.5121/ijcnc.2020.12404 fatcat:bt2bhbk6szbodkajfraycwapcq

Related-Key Differential Attacks on CHESS-64

2014 KSII Transactions on Internet and Information Systems  
Based on the differential properties of DDOs, we construct two types of related-key differential characteristics with one-bit difference in the master key.  ...  In this paper, the security of CHESS-64 block cipher under related-key differential cryptanalysis is studied.  ...  primitives in a number of fast block ciphers, namely Spectr-H64 [7] , Cobra-H64/128 [8] , CIKS-128H [9] , DDP-64 [10] and so on.  ... 
doi:10.3837/tiis.2014.09.018 fatcat:itnoas5olfdllfcbfpbc6vhq2y

A Class of Data-Dependent Operations

Nikolay A. Moldovyan, Alexander A. Moldovyan, Michael A. Eremeev
2006 International Journal of Network Security  
The proposed class represents a generalization of the known data-dependent permutations. New primitives are used to design switchable controlled operations and ciphers with simple key scheduling.  ...  This paper introduces a new class of the controlled primitives that are oriented to the use in the form of the data-dependent operations while designing fast hardwaresuitable ciphers.  ...  This defines necessity to combine CP-box operations with some other non-linear primitives while constructing encryption systems (see for example the ciphers CIKS-1 [11] , SPECTR-H64 [6] , and SPECTR-  ... 
dblp:journals/ijnsec/MoldovyanME06 fatcat:qqlikzqliffjfgivd6uaihumuq

New class of the FPGA efficient cryptographic primitives

N.A. Moldovyan, M.A. Eremeev, N. Sklavos, O. Koufopavlou
2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512)  
Two subclasses of nonlinear CE, with the best differential characteristics are recommended for the use in the non-linear DDO-boxes synthesis.  ...  Full classification of CE with two non-linear outputs is presented.  ...  the linear and differential cryptanalysis results of the ciphers CIKS-1 and SPECTR-H64 [6, 7, 8] show that differential attack is more efficient than linear one, the DDP are linear cryptographic primitive  ... 
doi:10.1109/iscas.2004.1329331 fatcat:kcypd2eadbhcppeyxqnszdernq