Filters








59 Hits in 2.6 sec

Security Analysis of BLAKE2's Modes of Operation

Atul Luykx, Bart Mennink, Samuel Neves
2016 IACR Transactions on Symmetric Cryptology  
It is a successor to the SHA-3 finalist BLAKE, which received a significant amount of security analysis.  ...  This implies that there are no generic attacks against any of the modes that BLAKE2 uses.  ...  Therefore, properly analyzing the security of the BLAKE2 modes of operation is important. Results.  ... 
doi:10.46586/tosc.v2016.i1.158-176 fatcat:nvk3lsi3ifenrbjhrhjbycctju

Security Analysis of BLAKE2's Modes of Operation

Atul Luykx, Bart Mennink, Samuel Neves
2016 IACR Transactions on Symmetric Cryptology  
It is a successor to the SHA-3 finalist BLAKE, which received a significant amount of security analysis.  ...  This implies that there are no generic attacks against any of the modes that BLAKE2 uses.  ...  Therefore, properly analyzing the security of the BLAKE2 modes of operation is important. Results.  ... 
doi:10.13154/tosc.v2016.i1.158-176 dblp:journals/tosc/LuykxMN16 fatcat:vdohkz4pqjdrhfrz4n2pmb5c6m

Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems

Geovandro C. C. F. Pereira, Renan C. A. Alves, Felipe L. da Silva, Roberto M. Azevedo, Bruno C. Albertini, Cíntia B. Margi
2017 Security and Communication Networks  
The deployment of security services over Wireless Sensor Networks (WSN) and IoT devices brings significant processing and energy consumption overheads.  ...  These overheads are mainly determined by algorithmic efficiency, quality of implementation, and operating system.  ...  Conflicts of Interest The authors declare that there are no conflicts of interest regarding the publication of this paper. Acknowledgments  ... 
doi:10.1155/2017/2046735 fatcat:touxgbbrfnfj7dbeujyabdksv4

BLAKE2: Simpler, Smaller, Fast as MD5 [chapter]

Jean-Philippe Aumasson, Samuel Neves, Zooko Wilcox-O'Hearn, Christian Winnerlein
2013 Lecture Notes in Computer Science  
On 64-bit platforms, BLAKE2 is often faster than MD5, yet provides security similar to that of SHA-3.  ...  BLAKE2 has more benefits than just speed: BLAKE2 uses up to 32% less RAM than BLAKE, and comes with a comprehensive tree-hashing mode as well as an efficient MAC mode.  ...  The reference source code package of BLAKE2, as available on https://blake2.net/, is published under the CC0 licence 7 .  ... 
doi:10.1007/978-3-642-38980-1_8 fatcat:lu3zcgq6ergc3pxqjlm5enas7m

An Efficient Key Management and Multi-layered Security Framework for SCADA Systems

Darshana Upadhyay, Marzia Zaman, Rohit Joshi, Srinivas Sampalli
2021 IEEE Transactions on Network and Service Management  
This makes the deployment of sophisticated security features challenging.  ...  Consequently, one of the critical aspects of the SCADA systems is secure transmission of messages so that they cannot be tampered during the communication.  ...  speed of various modes of AES and DES with the proposed hashed based Vernam Cipher.  ... 
doi:10.1109/tnsm.2021.3104531 fatcat:w4e4vyx6ijc45mskgnbhyboqzq

Secure and Authenticated Data Communication in Wireless Sensor Networks

Omar Alfandi, Arne Bochem, Ansgar Kellner, Christian Göge, Dieter Hogrefe
2015 Sensors  
This security scheme is implemented for TinyOS [4] , an open source operating system for sensor motes.  ...  Specifically, this paper will give a detailed analysis of the performance characteristics of certain block ciphers ( Skipjack [7], RC5 [8], AES128 [9], eXtended Tiny Encryption Algorithm (XTEA) [10]),  ...  The work was conceived of as part of a research effort led by Omar Alfandi. Conflicts of Interest The authors declare no conflict of interest.  ... 
doi:10.3390/s150819560 pmid:26266413 pmcid:PMC4570385 fatcat:7qi7rc4enbbndnwj7wyunxampi

Optimizing the Performance of Clouds Using Hash Codes in Apache Hadoop and Spark

Ahmed Abdul Hassan Al-Fatlawi, Ghassan N. Mohammed, Israa Al Barazanchi
2019 Journal of Southwest Jiaotong University  
Through the analysis, we present the corresponding runtime results.  ...  Hash functions are an integral part of MapReduce software, both in Apache Hadoop and Spark.  ...  Also, the performance of BLAKE2s is unexpectedly slow in that it's widely accepted the performance of BLAKE2s, as much better than MD5 and SHA256.  ... 
doi:10.35741/issn.0258-2724.54.6.3 fatcat:2rdsq5wa6ne3pnkh5icxoplyzq

Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE [chapter]

Thomas Espitau, Pierre-Alain Fouque, Pierre Karpman
2015 Lecture Notes in Computer Science  
Despite being an important technique dating from the mid-90's, this is the first time higherorder differentials have been applied to meet-in-the-middle preimages.  ...  We also apply our framework to the more recent SHA-3 finalist BLAKE and its newer variant BLAKE2, and give an attack for a 2.75-round preimage with padding, and a 7.5-round pseudo-preimage on the compression  ...  It combines a compression function which is a block cipher with 512-bit keys and 160-bit messages used in Davies-Meyer mode with a Merkle-Damgård mode of operation [14, Chap. 9].  ... 
doi:10.1007/978-3-662-47989-6_33 fatcat:sgu5btmorbfihmv6niegozettu

On the Resilience of Even-Mansour to Invariant Permutations

Bart Mennink, Samuel Neves
2021 Designs, Codes and Cryptography  
The attacks do not invalidate the security of the permutations themselves, but rather they demonstrate the tightness of our bounds and confirm that care should be taken when employing a cryptographic primitive  ...  We first formalize the use of invariant cryptographic permutations from a security perspective, and analyze the Even-Mansour block cipher construction.  ...  Other permutations, often single-purpose components of larger modes of operation, decide to omit such round constants, and let the mode of operation ensure that "bad" states are never reached.  ... 
doi:10.1007/s10623-021-00850-2 fatcat:g7gxepprufbkdgxlhsruvia45y

Efficiency Improvements for Encrypt-to-Self [article]

Jeroen Pijnenburg, Bertram Poettering
2020 arXiv   pre-print
To instantiate their encrypt-to-self primitive, Pijnenburg et al propose a mode of operation of the compression function of a hash function, with a carefully designed encoding function playing the central  ...  that would inevitably require implementations to disrespect memory alignment restrictions imposed by the word-wise operation of modern CPUs, ultimately leading to performance penalties.  ...  The research of Pijnenburg was supported by the EPSRC and the UK government as part of the Centre for Doctoral Training in Cyber Security at Royal Holloway, University of London (EP/P009301/1).  ... 
arXiv:2009.02667v1 fatcat:seij2pmpircc3jbjnqhqaqtdka

HYDRA: HYbrid Design for Remote Attestation (Using a Formally Verified Microkernel) [article]

Karim ElDefrawy, Norrathep Rattanavipanon, Gene Tsudik
2017 arXiv   pre-print
Building upon a formally verified software component increases confidence in security of the overall design of HYDRA and its implementation.  ...  Remote Attestation (RA) allows a trusted entity (verifier) to securely measure internal state of a remote untrusted hardware platform (prover).  ...  Lastly, runtime of the BLAKE2S-based MAC function achieves less than 200 milliseconds for attesting 10MB of memory regions in ODROID-XU4 APPENDIX B seL4'S PROOF ASSUMPTIONS seL4's functional correctness  ... 
arXiv:1703.02688v2 fatcat:wuggtxvwbvfghbgentun6hr2di

REISCH: Incorporating Lightweight and Reliable Algorithms into Healthcare Applications of WSNs

Mishall Al-Zubaidie, Zhongwei Zhang, Ji Zhang
2020 Applied Sciences  
Security analysis results confirm that REISCH is safe against some well-known attacks.  ...  The results of the performance analysis indicate that our scheme provides high efficiency in data integration between sensors and server (saves more than 24\% of alive sensors compared to traditional algorithms  ...  Experimental Analysis In this section, we evaluate the performance of REISCH in the execution of security operations in conjunction with the collected and saved data.  ... 
doi:10.3390/app10062007 fatcat:l42tpwih5bgsfnex2ze6hosdii

TPA Auditing to Enhance the Privacy and Security in Cloud Systems

Sunil Kumar, Dilip Kumar, Hemraj Shobharam Lamkuche
2021 Journal of Cyber Security and Mobility  
With our proposed system, we solve the concern of data reliability using data correctness and verification analysis and error recovery analysis.  ...  Our proposed system also shows resistance against various known cryptanalytic attacks, the performance and extensive compression technique of our proposed system are probably secure and highly proficient  ...  The algorithm supports input of any byte length(n) ranges from 0 < n < 264. It operates at ultra-fast speed on 3 different modes: hash (), keyedhash (), and derivekey ().  ... 
doi:10.13052/jcsm2245-1439.1033 fatcat:4wxp2zfs4fdoleg3riyh7vpmda

Wisecr: Secure Simultaneous Code Disseminationto Many Batteryless Computational RFID Devices [article]

Yang Su, Michael Chesser, Yansong Gao, Alanson P. Sample, Damith C. Ranasinghe
2021 arXiv   pre-print
and perform sensing and actuation functions under the control of a dedicated firmware operating without the supervisory control of an operating system.  ...  We consider the challenging problem of simultaneous and secure firmware updates or patching for a typical class of such devices -- Computational Radio Frequency Identification (CRFID) devices.  ...  At stage completion, each token switches from the Observer or Pilot to the normal mode of operation.  ... 
arXiv:2103.10671v2 fatcat:n6u3ng5znndizedmzzppkak3gi

Cryptanalysis of NORX v2.0

Colin Chaigneau, Thomas Fuhr, Henri Gilbert, Jérémy Jean, Jean-René Reinhard
2017 IACR Transactions on Symmetric Cryptology  
resp. 256-bit security.  ...  We emphasize that the scheme has recently been tweaked to NORX v3.0 at the beginning of the third round of the CAESAR competition: the main change introduces some key-dependent internal operations, which  ...  In [AJN15b] , the designers partly derive their security analysis from security proofs of the keyed-sponge mode of operation which can be found in [JLM14] .  ... 
doi:10.46586/tosc.v2017.i1.156-174 fatcat:of3epqp4crbarduv5rce5bhwha
« Previous Showing results 1 — 15 out of 59 results