Filters








5,280 Hits in 3.7 sec

On the Round Security of Symmetric-Key Cryptographic Primitives [chapter]

Zulfikar Ramzan, Leonid Reyzin
2000 Lecture Notes in Computer Science  
We put forward a new model for understanding the security of symmetric-key primitives, such as block ciphers.  ...  The model captures the fact that many such primitives often consist of iterating simpler constructs for a number of rounds, and may provide insight into the security of such designs.  ...  The first author was supported by a grant from Merrill-Lynch, and the second author was supported by a grant from the NTT corporation.  ... 
doi:10.1007/3-540-44598-6_24 fatcat:4gd5uluiu5cibhb5voh52fvhpu

Updated Broadcast Encryption with Efficient Encryption and Short Ciphertexts

T Dayakar, Tutut Herawan, Liu Xuejun
2016 International Journal of Reliable Information and Assurance  
In this new primitive, a gathering of individuals arrange a typical open encryption key while every part holds a decoding key.  ...  Gather key understanding (GKA) conventions empower a gathering of individuals to arrange a typical encryption key by means of open systems so that lone the gathering individuals can unscramble the ciphertexts  ...  These new applications call for cryptographic primitives allowing a sender to securely encrypt to any subset of the users of the services without relying on a fully trusted dealer.  ... 
doi:10.21742/ijria.2014.2.1.03 fatcat:o4m6xyye6zhavkyj73zluj2uaq

Customary Broadcast Encryption with Advanced Encryption and Short ciphertexts

Jae Yoon Lee, Mounika Durbha
2016 Asia-pacific Journal of Convergent Research Interchange  
In this new primitive, a gathering of individuals arrange a typical open encryption key while every part holds a decoding key.  ...  Group key Authentication (GKA) conventions empower a gathering of individuals to arrange a typical encryption key by means of open systems so that lone the gathering individuals can unscramble the ciphertexts  ...  Group key agreement (GKA) is another surely knew cryptographic primitive to secure gathering focused correspondences.  ... 
doi:10.21742/apjcri.2016.06.04 fatcat:oath2gf7q5gndpqksbp3s572wu

Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos [chapter]

M. Backes, I. Cervesato, A. D. Jaggard, A. Scedrov, J. -K. Tsay
2006 Lecture Notes in Computer Science  
Partially supported by ONR and NSF • Key secrecy in computational model: (later)  ...  PKINIT uses both public-key and symmetric cryptographic primitives (encryption, signatures, MACs…) • Proofs were carried out symbolically in the BPW model • Proofs in Dolev-Yao style model are cryptographically  ...  • Extend basic Kerberos 5 to use Public Keys • Change first round to avoid long-term shared keys (k C ) Symbolic Security Properties of Kerberos last round: {t'} SK C S ST, {C,t'} SK  ... 
doi:10.1007/11863908_23 fatcat:b6g5gob2crcmhn4wqibzv6ovoi

Lightweight Cryptographic for Securing Constrained Resource IoT Devices

2020 International journal of recent technology and engineering  
This paper provides an overview of the LWC primitives for IoT environment and presents various LWC algorithms based on their key dimension, block size, structures and number of rounds.  ...  For that, lightweight cryptographic primitives (LWC) have been introduced.  ...  Example of simple algorithms based on LWC are Hummingbird2 [16] which has no more than four rounds, and PRESENT which utilises 4-bit S-boxes.  Simple key schedules: The key schedule used in each round  ... 
doi:10.35940/ijitee.d9060.029420 fatcat:fne4gzufcnfslpsua4jw2ifpzm

The Long-Short-Key Primitive and Its Applications to Key Security [chapter]

Matthew Cary, Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan
2008 Lecture Notes in Computer Science  
Given a particular symmetric key, our approach generates two functions for encryption and decryption: The short-key function uses the original key, while the functionally equivalent long-key version works  ...  To address this problem, we designed and implemented a new primitive that helps provide better security for ciphers that use keys stored in easily accessible locations.  ...  Introduction On today's computing systems, security often relies on public-key cryptography and symmetric ciphers. Protection of cryptographic keys against eavesdroppers is a crucial issue.  ... 
doi:10.1007/978-3-540-89598-5_19 fatcat:ty4odmmamzgz3d3p775pweap3e

Quantitative Analysis and Comparison of Symmetric Cryptographic Security Algorithms

Mahaba Saad, Khalid Youssef, Hala Abdel-Kader
2016 Indonesian Journal of Electrical Engineering and Computer Science  
This paper provides quantitative analysis and comparison of some symmetric key cryptographic ciphers (DES, 3DES, AES, Blowfish, RC5, and RC6).  ...  Hence the search for the best solution to offer the necessary protection against the data intruders' attacks along with providing these services in time is one of the most interesting subjects in the security  ...  Projection of reference model on cryptographic selected security algorithm operations is listed below.  ... 
doi:10.11591/ijeecs.v4.i1.pp116-124 fatcat:35k5osyt5fabxnb2vngt3fiwpy

Dronecrypt - An Efficient Cryptographic Framework for Small Aerial Drones

Muslum Ozgur Ozmen, Attila A. Yavuz
2018 MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM)  
(ii) We also integrate recent light-weight symmetric primitives into our PKI techniques to provide a full-fledged cryptographic framework.  ...  It is critical to ensure the cyber security of networked aerial drone systems in these applications.  ...  We would like to thank the anonymous reviewers for their insightful comments and suggestions. This work is supported by NSF CAREER Award CNS-1652389.  ... 
doi:10.1109/milcom.2018.8599784 dblp:conf/milcom/OzmenY18 fatcat:naoylei57fexnncsn5ofqbku54

Requirements for symmetric block encryption algorithms developed for software and hardware implementation

Kairat Sakanuly Sakan, N. A. Kapalova, A. Haumen, O. T. Suleimenov
2021 Journal of Mathematics Mechanics and Computer Science  
The possibilities and necessary limitations of the types of cryptographic transformations (primitives) in the software and hardware implementation of the developed symmetric block encryption algorithm  ...  The hardware and software cryptographic information protection facility is one of the most important components of comprehensive information security in information and communication systems and computer  ...  Selection of basic cryptographic primitives and development of a cryptographic scheme.  ... 
doi:10.26577/jmmcs.2021.v112.i4.12 fatcat:bgru6x5xnzbyti6dtuugbfkmle

New Public Integrity Auditing Scheme for Cloud Data Storage Using Mac And Symmetric Key Cryptographic Algorithms

A. Emily Jenifer, S. Karthigaiveni
2016 International Journal of Applied Engineering Research  
The experimental results are analyzed and evaluated in terms of computation time, block size, key size, number of rounds and cycles per block.  ...  Thus, this paper proposed a new public integrity auditing mechanism with the help of Message Authentication Code (MAC) generation and symmetric cryptographic techniques.  ...  Fig 7 shows the variation of rounds for both the proposed and existing AES method. The number of rounds for AES is 14 and for proposed symmetric cipher block is 12.  ... 
doi:10.37622/ijaer/11.3.2016.1894-1899 fatcat:flcgqm5tkzgengqu45gar24pfa

A performance comparison of lightweight cryptographic algorithms suitable for IoT transmissions

Jihane Jebrane, Saiida Lazaar
2021 General Letters in Mathematics  
In this context, we propose a review of the research progress on IoT architecture.  ...  The main goal of the present paper is to highlight the need to provide security systems for IoT applications through lightweight cryptographic mechanisms.  ...  Firstly, the efficiency of the lightweight symmetric key algorithm to realize end-to-end communications security with limited energy consumption.  ... 
doi:10.31559/glm2021.10.2.5 fatcat:l4eux7qk6jdtphmpny3skkexeq

A Study on Cryptographic Techniques

Anjali Krishna A, L. C. Manikandan
2020 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
In current scenario, to store data securely on online is a tedious task as a result proper security over the network.  ...  As the technology grows day by day, the need for data security over the channel of communication is greatly increased. Several cryptographic schemes are used for secure communication.  ...  Number of rounds to use depends on key duration e.g. 10 rounds for 128 bit key, 12 rounds for 192-bit key and 14 rounds for 256 bit key.  ... 
doi:10.32628/cseit206453 fatcat:csbwu7uxtvccnatjpnt6bjskxy

Node-Node Data Exchange in IoT Devices Using Twofish and DHE

Bismark Tei Asare, Kester Quist-Aphetsi, Laurent Nana
2021 Advances in Science, Technology and Engineering Systems  
This paper aims at providing a cryptographic solution that uses a key exchange cryptographic primitive and a strong cipher in encrypting messages for exchange between nodes in an IoT.  ...  The use of key exchange algorithms in resilient cryptographic solution that have less computational requirements without compromising the security efficiency in the encryption of messages for IoT continues  ...  An analysis on the throughput, battery drain, key space and its impact on the security of related symmetric key ciphers for IoT constrained devices would be explored for future works.  ... 
doi:10.25046/aj060271 fatcat:2pcyirgjtjbqxmuirmmvv7u76i

A Novel Approach to Communicate Secret Message between Users Using Sponge Function Technique on NTRU

S. Varaprasad, K. Venkata Rao, P.S. Avadhani
2013 International Journal of Science and Engineering  
the research states of sponge functions, lightweight hash functions-KDC -NTRU.  ...  In proposed work we propose how the group communication establishes registration of users, entry and exit of a user. The encryption and decryption algorithm are used between sender and receiver.  ...  The security of key distribution based on classical symmetric-key cryptography depends on the security of the cryptographic primitives that are used, and on the composability of those crypto primitives  ... 
doi:10.12777/ijse.4.2.2013.44-51 fatcat:s63lmyjtbrfcddethztyehfnae

A Novel Approach to Communicate Secret Message between Users Using Sponge Function Technique on NTRU

S. Varaprasad, K.Venkata Rao, P.S. Avadhani
2013 International Journal of Science and Engineering  
the research states of sponge functions, lightweight hash functions-KDC -NTRU.  ...  In proposed work we propose how the group communication establishes registration of users, entry and exit of a user. The encryption and decryption algorithm are used between sender and receiver.  ...  The security of key distribution based on classical symmetric-key cryptography depends on the security of the cryptographic primitives that are used, and on the composability of those crypto primitives  ... 
doi:10.12777/ijse.4.2.44-51 fatcat:m4pdfm5xkra5piecah45bhjv5e
« Previous Showing results 1 — 15 out of 5,280 results