62 Hits in 3.3 sec

Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers [chapter]

Debra L. Cook, Moti Yung, Angelos D. Keromytis
Lecture Notes in Computer Science  
With this question in mind, we analyze elastic block ciphers and consider the security against two basic types of attacks, linear and differential cryptanalysis.  ...  The structure of elastic block ciphers allows us to use a state transition method to compute differentials for the elastic version from differentials of the round function of the original cipher.  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the NSF or the U.S Government.  ... 
doi:10.1007/978-3-540-70500-0_14 fatcat:6mogevomejhsdcpbiebry3vuvu

A New Design of Permutation Function Using Spiral Fibonacci in Block Cipher

Kamsiah Mohamed
2020 International Journal of Advanced Trends in Computer Science and Engineering  
This paper emphasizes on the new design of permutation function for improving security in modern block ciphers.  ...  Thus, the proposed block cipher improved diffusion property between the plaintext and ciphertext.  ...  A study by [10] found that the 128-bit software block cipher DSDP had eight key-dependent permutation boxes designed to avoid differential and linear cryptanalysis.  ... 
doi:10.30534/ijatcse/2020/7091.32020 fatcat:bkmxkr23kjhbnfmvyqv35mjewm

Elastic block ciphers

Debra Cook, Angelos Keromytis, Moti Yung
2007 Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS '07  
We define a method for converting any existing block cipher into an elastic block cipher and mention our analysis of the construction.  ...  We introduce the concept of an elastic block cipher, which refers to stretching the supported block size of a block cipher to any length up to twice the original block size while incurring a computational  ...  This result eliminates the need to analyze each elastic block cipher individually against practical attacks (such as linear and differential cryptanalysis) if the fixed-length versions are secure against  ... 
doi:10.1145/1229285.1229324 dblp:conf/ccs/CookKY07 fatcat:gsqvfehy6zcublhoii3ubtmcg4

Towards Key-recovery-attack Friendly Distinguishers: Application to GIFT-128

Rui Zong, Xiaoyang Dong, Huaifeng Chen, Yiyuan Luo, Si Wang, Zheng Li
2021 IACR Transactions on Symmetric Cryptology  
When analyzing a block cipher, the first step is to search for some valid distinguishers, for example, the differential trails in the differential cryptanalysis and the linear trails in the linear cryptanalysis  ...  A distinguisher is advantageous if it can be utilized to attack more rounds and the amount of the involved key bits during the key-recovery process is small, as this leads to a long attack with a low complexity  ...  Acknowledgments The authors would like to thank the anonymous referees for their helpful comments.  ... 
doi:10.46586/tosc.v2021.i1.156-184 fatcat:elladx7nuvhkfghfcyzmrl7ie4

Randomness Evaluation Framework of Cryptographic Algorithms

Cristina-Loredana Duta, Bogdan-Costel Mocanu, Florin-Alexandru Vladescu, Laura Gheorghe
2014 International Journal on Cryptography and Information Security  
For this, all nine tests used for evaluation of AES candidate block ciphers and three NIST statistical tests are applied to the algorithm being tested.  ...  function and the key schedule function of the cipher that has to be tested (block cipher or stream cipher), the application evaluates the randomness and provides an interpretation of the results.  ...  We wanted to emphasize the importance of random number sequences in digital cryptography and to present a framework which can be used to statistically test any cryptographic algorithm.  ... 
doi:10.5121/ijcis.2014.4103 fatcat:7zp2qtolljftlaxofkd5z7xclu

Elastic block ciphers: method, security and instantiations

Debra L. Cook, Moti Yung, Angelos D. Keromytis
2009 International Journal of Information Security  
We demonstrate the general applicability of the elastic block cipher method by constructing examples from existing block ciphers: AES, Camellia, MISTY1 and RC6.  ...  Our method is designed to enable us to form a reduction between the elastic and the original versions of the cipher.  ...  These attacks typically attempt to recover the keys or the round keys of the block cipher; differential [7, 18] , linear [20] and exhaustive search methods are instances of such attacks (but other attacks  ... 
doi:10.1007/s10207-008-0075-9 fatcat:h7rm2xvek5e6lmijbrrlqkfhfe

Comparative Analysis of Impact of Cryptography Algorithms on Wireless Sensor Networks [article]

Bilwasiva Basu Mallick, Ashutosh Bhatia
2021 arXiv   pre-print
Cryptography techniques are essential for a robust and stable security design of a system to mitigate the risk of external attacks and thus improve its efficiency.  ...  This study will pave the way for future research on this topic since it will provide a comprehensive and holistic view of the subject.  ...  LIGHTWEIGHT BLOCK CIPHER TECHNIQUES Block Ciphers are one of the fundamental methods used for a very simplified version of cryptography.  ... 
arXiv:2107.01810v1 fatcat:ziqggxqzlbdzbmhcumgtlnkxpe

Attacking Misaligned Power Tracks Using Fourth-Order Cumulant

Eng. Mustafa, Prof. Dr., Prof. Dr.
2013 International Journal of Advanced Computer Science and Applications  
Moreover, this paper illustrates that the proposed analysis can efficiently deal with Gaussian noise and misaligned tracks through comprehensive analysis of an AES 128 bit block cipher.  ...  Power consumptions, electromagnetic emissions, and operation timing of cryptographic hardware are examples of measurable parameters (analysis) effected by internal confident data.  ...  In order to detect similar shapes with different phases, DTW method allows elastic shifting of the time axis. Also, speech processing community uses this technique for long time.  ... 
doi:10.14569/ijacsa.2013.041202 fatcat:mkzcfuo4lfd2tetzsdtvdicxki

ESTATE: A Lightweight and Low Energy Authenticated Encryption Mode

Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi, Yu Sasaki
2020 IACR Transactions on Symmetric Cryptology  
In particular, ESTATE does not require an additional multiplication circuit, and it reduces the number of block cipher calls by one.  ...  short messages (For 16-byte message, a throughput of 1251.10 and 945.36 Mbps for ESTATE_TweAES and SUNDAE_AES-128 respectively).  ...  Avik Chakraborti, Nilanjan Datta, Ashwin Jha and Mridul Nandi are supported by the project "Study and Analysis of IoT Security" under Government of India at R.C.Bose Centre for Cryptology and Security,  ... 
doi:10.13154/tosc.v2020.is1.350-389 dblp:journals/tosc/ChakrabortiDJMN20 fatcat:6mrcjbomhjeujn7urxyzrwpx44

Heuristic Methods of Hill Climbing of Cryptographic Boolean Functions

Illarion Moskovchenko, Mykola Pastukhov, Alexandr Kuznetsov, Tetiana Kuznetsova, Valeriia Prokopenko, Vitaliy Kropyvnytskyi
2018 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T)  
In this article, heuristic methods of hill climbing for cryptographic Boolean functions satisfying the required properties of balance, nonlinearity, autocorrelation, and other stability indicators are  ...  A technique for estimating the computational efficiency of gradient search methods, based on the construction of selective (empirical) distribution functions characterizing the probability of the formation  ...  In [12, 13] , the influence of S-blocks on avalanche effects, differential and linear properties of block ciphers is investigated.  ... 
doi:10.1109/infocommst.2018.8632017 fatcat:apdzmqptqbderetvuq7276tk7y

SLEPX: An Efficient Lightweight Cipher for Visual Protection of Scalable HEVC Extension

Rizwan A. Shah, Mamoona N. Asghar, Saima Abdullah, Nadia Kanwal, Martin Fleury
2020 IEEE Access  
CRYPTANALYSIS This Section considers the possibilities for several common attacks against SLEPX. 1) DIFFERENTIAL ATTACK A differential attack is particularly critical for any encryption algorithm.  ...  AES was used in Cipher Feedback Mode (CFB) mode [74] , which is one of a number of well-established and common modes of operation for block ciphers.  ...  He has more than 10 years of teaching and R&D experience.  ... 
doi:10.1109/access.2020.3030608 fatcat:nxg5pqqh7rhwdiyosvmaixeaue

Power Side Channels in Security ICs: Hardware Countermeasures [article]

Lu Zhang, Luis Vega, Michael Taylor
2016 arXiv   pre-print
Designers and manufacturers of cryptographic devices have in response developed various countermeasures for protection. Attacking methods have also evolved to counteract resistant implementations.  ...  Power side-channel attacks are a very effective cryptanalysis technique that can infer secret keys of security ICs by monitoring the power consumption.  ...  Such data dependencies are amplified by the non-linear functions of modern ciphers, for example, the AES S-Box. The S-Box was designed to resist conventional linear cryptanalysis.  ... 
arXiv:1605.00681v1 fatcat:lwx5jvoh5nh2ziyr3ibuuctxdq

A Study on Authentication Framework by using 2-D 3-D Image/Video Based Encryption

Shailesh Kumar, Dr. Yogesh Kumar Sharma, Dr. Keshava Prasanna
2018 International Journal of Engineering Research and  
Here we represent facial surfaces by radial curves emanating from the nose tips and use elastic shape analysis of these curves to develop a Riemannian framework for analyzing shapes of full facial surfaces  ...  A novel geometric framework is proposed for analyzing 3D faces, with the specific goals of comparing, matching, and averaging their shapes.  ...  It is a Feistel Cipher and uses 16 round Feistel structure having a block size of 64 bit. The plaintext is processed in the following three phases: 1.  ... 
doi:10.17577/ijertv7is020073 fatcat:4pdnj2bbwbdwbfirtxmezpm4wu

TPA Auditing to Enhance the Privacy and Security in Cloud Systems

Sunil Kumar, Dilip Kumar, Hemraj Shobharam Lamkuche
2021 Journal of Cyber Security and Mobility  
With our proposed system, we solve the concern of data reliability using data correctness and verification analysis and error recovery analysis.  ...  With cloud computing, huge amount of data transactions is communicated between cloud consumers and cloud service providers.  ...  Throughout this paper, we have used lightweight block cipher CSL encoding algorithm for which executes on a fixed block of size 64-bit and key size is in range of 64-bit to 128-bit for the encryption process  ... 
doi:10.13052/jcsm2245-1439.1033 fatcat:4wxp2zfs4fdoleg3riyh7vpmda


Swati Vithal Khidse, Dr. Santosh S. Lomte
2019 Zenodo  
Unauthorized user performs number of attempts for accessing the data till he gets some information of use, which results into denial-of-service attack, brute-force attack and etc.  ...  One such major concern is about security and privacy of data being stored in cloud database.  ...  Deposit of keys Needed Needed Needed 12. Inherent Vulnerabilities Brute Force Attack Brute Force Attack, Linear and differential cryptanalysis attack Brute Force and Oracle Attack 13.  ... 
doi:10.5281/zenodo.3575039 fatcat:vlj5fhb3vfeztim4g5kulfqssy
« Previous Showing results 1 — 15 out of 62 results