A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2005; you can also visit the original URL.
The file type is application/pdf
.
Filters
Slide Attack on Spectr-H64
[chapter]
2002
Lecture Notes in Computer Science
in the round transformation of Spectr-H64. ...
We compare one round diffusion characteristics of the block cipher Spectr-H64 to those of AES-Rijndael and Safer K-64, in terms of the Avalanche Weight Distribution (AWD) criterion and observe a weakness ...
Breaking One Round of Spectr-H64 Our idea to break one round of Spectr-H64 is based upon the influential work on differential cryptanalysis [4, 5] . ...
doi:10.1007/3-540-36231-2_4
fatcat:aotk7ptjlfhihivrsla72mrjsu
High Speed Networking Security: Design and Implementation of Two New DDP-Based Ciphers
2005
Journal on spesial topics in mobile networks and applications
The achieved hardware performance and the implementation area cost of Cobra-H64 and Cobra-H128 are compared with other ciphers, used in security layers of wireless protocols (Bluetooth, WAP, OMA, UMTS ...
The designed ciphers operate efficiently with different plaintext lengths, 64 and 128-bit, for Cobra-H64 and Cobra-H128, respectively. ...
Security estimation of the DDP-based ciphers CIKS-1 [11] and SPECTR-H64 [10] against linear cryptanalysis has shown that DDP are efficient, provided they are combined with other non-linear operations ...
doi:10.1023/b:mone.0000048556.51292.31
fatcat:otltzob5tjbi7lfltzyvsgnddi
On Software Implementation of Fast DDP-based Ciphers
2007
International Journal of Network Security
Different types of fast software and firmware encryption algorithms combining DDP with fast arithmetic operations are described. ...
Presented results show the ciphers are secure against differential analysis. Other attacks are also considered. ...
Acknowledgement This work was carried out as part of the AFRL funded project #1994p which supported the authors. ...
dblp:journals/ijnsec/MoldovyanMS07
fatcat:66h2y5kqnzfntdajynblvv4kk4
Hybrid Model in the Block Cipher Applications for High-speed Communications Networks
2020
International Journal of Computer Networks & Communications
Each design has a specific strength that makes the selection more compatible with the objectives of each particular application. ...
The designs match the limited environment of the wireless network by integrating effectively when implemented on Field-programmable gate array (FPGA) with both iterative and pipeline architectures for ...
ACKNOWLEDGMENTS This research was supported by the project "Research, design and fabrication of IoT gateway devices integrated for the security solution in the IoT platform and applied for the air quality ...
doi:10.5121/ijcnc.2020.12404
fatcat:bt2bhbk6szbodkajfraycwapcq
Related-Key Differential Attacks on CHESS-64
2014
KSII Transactions on Internet and Information Systems
Based on the differential properties of DDOs, we construct two types of related-key differential characteristics with one-bit difference in the master key. ...
In this paper, the security of CHESS-64 block cipher under related-key differential cryptanalysis is studied. ...
primitives in a number of fast block ciphers, namely Spectr-H64 [7] , Cobra-H64/128 [8] , CIKS-128H [9] , DDP-64 [10] and so on. ...
doi:10.3837/tiis.2014.09.018
fatcat:itnoas5olfdllfcbfpbc6vhq2y
A Class of Data-Dependent Operations
2006
International Journal of Network Security
The proposed class represents a generalization of the known data-dependent permutations. New primitives are used to design switchable controlled operations and ciphers with simple key scheduling. ...
This paper introduces a new class of the controlled primitives that are oriented to the use in the form of the data-dependent operations while designing fast hardwaresuitable ciphers. ...
This defines necessity to combine CP-box operations with some other non-linear primitives while constructing encryption systems (see for example the ciphers CIKS-1 [11] , SPECTR-H64 [6] , and SPECTR- ...
dblp:journals/ijnsec/MoldovyanME06
fatcat:qqlikzqliffjfgivd6uaihumuq
New class of the FPGA efficient cryptographic primitives
2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512)
Two subclasses of nonlinear CE, with the best differential characteristics are recommended for the use in the non-linear DDO-boxes synthesis. ...
Full classification of CE with two non-linear outputs is presented. ...
the linear and differential cryptanalysis results of the ciphers CIKS-1 and SPECTR-H64 [6, 7, 8] show that differential attack is more efficient than linear one, the DDP are linear cryptographic primitive ...
doi:10.1109/iscas.2004.1329331
fatcat:kcypd2eadbhcppeyxqnszdernq