Filters








6,152 Hits in 3.8 sec

Security against eavesdropping in quantum cryptography [article]

N. Lütkenhaus, Stephen M. Barnett
1997 arXiv   pre-print
The other scenario allows a measurement delay, so that the general attack of an eavesdropper on individual signals is covered.  ...  One scenario does not allow a delay of the eavesdropper's measurement of a measurement probe until he receives additional classical information. In this scenario we achieve a sharp bound.  ...  One of the analysers distinguishes between the two linear polarisations, the other between the circular polarisations. Therefore the sequence of signals contains two types of transmissions.  ... 
arXiv:quant-ph/9711033v1 fatcat:2v73yrzl7vf7tbrliftdkh4n3y

Security Against Eavesdropping in Quantum Cryptography [chapter]

Norbert Lütkenhaus, Stephen M. Barnett
1997 Quantum Communication, Computing, and Measurement  
One of the analysers distinguishes between the two linear polarisations, the other between the circular polarisations. Therefore the sequence of signals contains two types of transmissions.  ...  Here we present a sharp bound [7, 8] on the Shannon information of an eavesdropper which is valid for all eavesdropping attacks which access each signal photon independently of each other.  ... 
doi:10.1007/978-1-4615-5923-8_10 fatcat:egbtv5oitzdqxmx3swjga7hkea

Security against eavesdropping in quantum cryptography

Norbert Lütkenhaus
1996 Physical Review A. Atomic, Molecular, and Optical Physics  
One of the analysers distinguishes between the two linear polarisations, the other between the circular polarisations. Therefore the sequence of signals contains two types of transmissions.  ...  Here we present a sharp bound [7, 8] on the Shannon information of an eavesdropper which is valid for all eavesdropping attacks which access each signal photon independently of each other.  ... 
doi:10.1103/physreva.54.97 pmid:9913462 fatcat:mengvq6wwrac7khj2mjxud5hua

Page 5304 of Mathematical Reviews Vol. , Issue 97H [page]

1997 Mathematical Reviews  
The Shannon entropy is an information measure of dimension one. Directed divergence and information improvement are examples of 2-dimensional and 3-dimensional information measures.  ...  It is shown that the additive k-dimensional information measures along with the sum property are essentially the linear combination of the Shannon entropies and Kerridge inaccuracies.” 97h:94004 94A55  ... 

NON LINEAR FEEDBACK STREAM CIPHER

Dr .R. Siva Ram Prasad, G. Murali, S. Gopi Krishna
2012 International journal of computer and communication technology  
NLFS means Non-linear feedback stream cipher, which is a fast and secure stream cipher for egovernance applications. This stream cipher uses AES secure non-linear function and AES key generation.  ...  In selfsynchronous mode key stream generation depending on cipher text. In self synchronous mode generated keystream update first 512-bit buffer and cipher text update the second buffer.  ...  That efficient updating of internal state resists GD attack on NLFS. NLFS have enough period to prevent distinguish attack.  ... 
doi:10.47893/ijcct.2012.1128 fatcat:3uzhjlwx7bfaracnqigkxuiigu

Decorrelation: A Theory for Block Cipher Security

Serge Vaudenay
2003 Journal of Cryptology  
We addressed the basic differential and linear cryptanalysis and the more general model of iterated attacks which are based on a (low) specific number q of plaintext/ciphertext samples.  ...  We show how to ensure security against basic differential and linear cryptanalysis and even more general attacks. We propose practical construction schemes.  ...  Linear Distinguisher. Lemma 14.  ... 
doi:10.1007/s00145-003-0220-6 fatcat:hhej7nvrgnac3am3aqa3k3vj6y

Differential entropy analysis of the IDEA block cipher

Alex Biryukov, Jorge Nakahara, Hamdi Murat Yıldırım
2014 Journal of Computational and Applied Mathematics  
We present key-recovery attacks on up to 2.5-round IDEA in the single-key model and without weakkey assumptions.  ...  This paper describes a new cryptanalytic technique that combines differential cryptanalysis with Shannon entropy. We call it differential entropy (DE).  ...  DE attacks on IDEA using subtraction differences Distinguish-from-random attacks using subtraction difference can be performed just like the attack on 1.5-round IDEA starting from an MA half-round in Section  ... 
doi:10.1016/j.cam.2013.08.002 fatcat:uajvnbbrzzc2nled65zejd2cta

Measuring Privacy Leakage for IDS Rules [article]

Nils Ulltveit-Moe, Vladimir Oleshchuk
2013 arXiv   pre-print
on user behaviour.  ...  The analysis shows that the metric is able to distinguish between IDS rules that have no or low expected privacy leakage and IDS rules with a significant risk of leaking sensitive information, for example  ...  However, it still only detects one attack vector, that does not change between attacks.  ... 
arXiv:1308.5421v1 fatcat:zcg5ijfxgrgb3kknre7upfa7aa

An introduction to Block Cipher Cryptanalysis

C. de Canniere, A. Biryukov, B. Preneel
2006 Proceedings of the IEEE  
Because of the growing number of practical applications relying on their security, block ciphers have received, and are still receiving, a substantial amount of attention from academic cryptanalysts.  ...  The second algorithm, Algorithm 2, was a key recovery attack based on a 15-round linear distinguisher.  ...  The attack relies on the existence of a linear approximation of the cipher.  ... 
doi:10.1109/jproc.2005.862300 fatcat:7r2f6t67unbo5cu4vb7z4p5loa

Quantitative Mitigation of Timing Side Channels [chapter]

Saeid Tizpaz-Niari, Pavol Černý, Ashutosh Trivedi
2019 Lecture Notes in Computer Science  
For instance, for min-guess entropy, we used mixed integer-linear programming.  ...  We evaluate our tool Schmit on a number of micro-benchmarks and real-world applications with different entropybased objectives.  ...  The running time of the applications depend on the slope of the linear loops determined by the secret input.  ... 
doi:10.1007/978-3-030-25540-4_8 fatcat:jt6psqtuq5d5ddkqae45enyi54

An Entropy-Based Network Anomaly Detection Method

Przemysław Bereziński, Bartosz Jasiul, Marcin Szpyrka
2015 Entropy  
prove that an entropy-based approach is suitable to detect modern botnet-like malware based on anomalous patterns in network.  ...  One of the data mining tasks is anomaly detection which is the analysis of large quantities of data to identify items, events or observations which do not conform to an expected pattern.  ...  PBS1/A3/14/2012 "Sensor Data Correlation Module for Attack Detection and Decision Support" and by the European Regional Development Fund the Innovative Economy Operational Programme, under the INSIGMA  ... 
doi:10.3390/e17042367 fatcat:kz6u6iuupvdanhqhokytuu4ive

Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics

Yang Xiang, Ke Li, Wanlei Zhou
2011 IEEE Transactions on Information Forensics and Security  
The proposed generalized entropy metric can detect attacks several hops earlier (three hops earlier while the order ) than the traditional Shannon metric.  ...  Furthermore, the proposed IP traceback algorithm can find all attacks as well as attackers from their own local area networks (LANs) and discard attack traffic.  ...  This increase is almost linear. Therefore, we can adjust the order value according to different requirements.  ... 
doi:10.1109/tifs.2011.2107320 fatcat:7jmqaiqhk5gzhje7ejy5tebtoe

Security of Quantum Key Distribution against All Collective Attacks

Not Available Not Available, Not Available Not Available, Not Available Not Available, van de Graaf, Not Available Not Available
2002 Algorithmica  
In this work we prove security against a very important class of attacks called collective attacks (under a compatible noise model) which use quantum memories and gates, and which are directed against  ...  Security of quantum key distribution against sophisticated attacks is among the most important issues in quantum information theory.  ...  Security of Quantum Key Distribution against All Collective Attacks  ... 
doi:10.1007/s00453-002-0973-6 fatcat:mhfse7ifqnd6fha4pouc3kzzwa

Denial-of-Service Attack Detection via Differential Analysis of Generalized Entropy Progressions [article]

Omer Subasi, Joseph Manzano, Kevin Barker
2021 arXiv   pre-print
Denial-of-Service (DoS) attacks are one the most common and consequential cyber attacks in computer networks.  ...  magnitude on average.  ...  distinguish various types of DoS attacks and flash events.  ... 
arXiv:2109.08758v1 fatcat:mdwooui67ng4nap5mjbopk3mim

Page 3402 of Mathematical Reviews Vol. , Issue 98E [page]

1998 Mathematical Reviews  
It is shown that, when randomly generated substitution boxes (s-boxes) are used in a CAST-like encryption algorithm, the resulting cipher is resistant to both the linear attack and the differential attack  ...  Summary: “Linear cryptanalysis and differential cryptanalysis are two recently introduced, powerful methodologies for attacking private-key block ciphers.  ... 
« Previous Showing results 1 — 15 out of 6,152 results