Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Cryptanalysis" wg kryterium: Temat


Wyświetlanie 1-6 z 6
Tytuł:
Finding Differential Paths in ARX Ciphers through Nested Monte-Carlo Search
Autorzy:
Dwivedi, A. D.
Morawiecki, P.
Wójtowicz, S.
Powiązania:
https://bibliotekanauki.pl/articles/226721.pdf
Data publikacji:
2018
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
ARX ciphers
SPECK Cipher
Nested Monte-Carlo Search
differential cryptanalysis
Opis:
We propose the adaptation of Nested Monte-Carlo Search algorithm for finding differential trails in the class of ARX ciphers. The practical application of the algorithm is demonstrated on round-reduced variants of block ciphers from the SPECK family. More specifically, we report the best differential trails, up to 9 rounds, for SPECK32.
Źródło:
International Journal of Electronics and Telecommunications; 2018, 64, 2; 147-150
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Tabu Search Against Permutation Based Stream Ciphers
Autorzy:
Polak, I.
Boryczka, M.
Powiązania:
https://bibliotekanauki.pl/articles/227111.pdf
Data publikacji:
2018
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
tabu search
TS
cryptanalysis
RC4
VMPC
stream cipher
state recovery attack
Opis:
Encryption is one of the most effective methods of securing data confidentiality, whether stored on hard drives or transferred (e.g. by e-mail or phone call). In this paper a new state recovery attack with tabu search is introduced. Based on research and theoretical approximation it is shown that the internal state can be recovered after checking 2⁵² internal states for RC4 and 2¹⁸⁰ for VMPC.
Źródło:
International Journal of Electronics and Telecommunications; 2018, 64, 2; 137-145
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cryptographic Protection for Military Radio Communications
Autorzy:
Białas, Robert
Grzonkowski, Marcin
Wicik, Robert
Powiązania:
https://bibliotekanauki.pl/articles/1844479.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
cryptography
cryptanalysis
radio communication
quantum computers
Opis:
Protecting the confidentiality, integrity and availability of information is very important in any telecommunications system. Information protection requires use of necessary physical, personal, information and communication technologies and above all – electromagnetic and cryptographic security measures. Equipment and tools for cryptographic protection should be examined and assessed in terms of resistance to known threats. Additional requirements are put on information protection for radio communication, especially military, where radio transmission is characterized by uncertainty of establishing and maintaining connections, bit rates are relatively low, often without full duplex. All this has an impact on the methods of cryptographic synchronization and implementation of cryptographic functions. A different approach to information protection is required by classic narrowband radio communications, a different one in time-division multi-access modes, and another one in broadband packet data transmission. Systems designed for information protection in radio communications implement appropriate operating modes of operation for cryptographic algorithms and protocols. Latest threats from quantum computers pose new challenges, especially in systems using public-key cryptography, because there are algorithms that can be used to attack these schemes with polynomial complexity.
Źródło:
International Journal of Electronics and Telecommunications; 2020, 66, 4; 687-693
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Differential Cryptanalysis of New Qamal Encryption Algorithm
Autorzy:
Algazy, Kunbolat T.
Babenko, Ludmila K.
Biyashev, Rustem G.
Ishchukova, Evgeniya A.
Romaniuk, Ryszard
Kapalova, Nursulu A.
Nysynbaeva, Saule E.
Smolarz, Andrzej
Powiązania:
https://bibliotekanauki.pl/articles/1844475.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
cryptography
block cipher
difference
differential cryptanalysis
probability
Opis:
Currently, the Republic of Kazakhstan is developing a new standard for symmetric data encryption. One of the candidates for the role of the standard is the Qamal encryption algorithm developed by the Institute of Information and Computer Technologies (Almaty, Republic of Kazakhstan). The article describes the algorithm. Differential properties of the main operations that make up the Qamal cypher are considered in the questions of stability. We have shown that for a version with a 128-bit data block and the same secret key size for three rounds of encryption it is difficult to find the right pairs of texts with a probability of 2–120, which makes differential cryptanalysis not applicable to the Qamal cypher.
Źródło:
International Journal of Electronics and Telecommunications; 2020, 66, 4; 647-653
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Multi-factor signcryption scheme for secure authentication using hyper elliptic curve cryptography and bio-hash function
Autorzy:
Rajasekar, Vani
Premalatha, J.
Sathya, K.
Powiązania:
https://bibliotekanauki.pl/articles/200881.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
signcryption
bio-hash function
hyperelliptic curve
cryptanalysis
authentication
Opis:
Among rapid development of wireless communication, technology cryptography plays a major role in securing the personal information of the user. As such, many authentication schemes have been proposed to ensure secrecy of wireless communication but they fail to meet all the required security goals. The proposed signcryption scheme uses multi-factor authentication techniques such as user biometrics, smart card and passwords to provide utmost security of personal information. In general, wireless devices are susceptible to various attacks and resource constraint by their very nature. To overcome these challenges a lightweight cryptographic scheme called signcryption has evolved. Signcryption is a logical combination of encryption and digital signature in a single step. Thereby it provides necessary security features in less computational and communication time. The proposed research work outlines the weaknesses of the already existing Cao et al.’s authentication scheme, which is prone to biometric recognition error, offline password guessing attack, impersonation attack and replay attack. Furthermore, the proposed study provides an enhanced multi-factor authentication scheme using signcryption based on hyper elliptic curve cryptography and bio-hash function. Security of the proposed scheme is analyzed using Burrows-Abadi-Needham logic. This analysis reveals that the proposed scheme is computational and communication-efficient and satisfies all the needed security goals. Finally, an analysis of the study results has revealed that the proposed scheme protects against biometric recognition error, password guessing attack, impersonation attack, DoS attack and dictionary attack.
Źródło:
Bulletin of the Polish Academy of Sciences. Technical Sciences; 2020, 68, 4; 923-935
0239-7528
Pojawia się w:
Bulletin of the Polish Academy of Sciences. Technical Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Development and Analysis of Symmetric Encryption Algorithm Qamal Based on a Substitution-permutation Network
Autorzy:
Biyashev, Rustem G.
Kapalova, Nursulu A.
Dyusenbayev, Dilmuhanbet S.
Algazy, Kunbolat T.
Wojcik, Waldemar
Smolarz, Andrzej
Powiązania:
https://bibliotekanauki.pl/articles/1844594.pdf
Data publikacji:
2021
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
encryption
cryptanalysis
S-box
SP-network
avalanche effect
statistical property
Opis:
This paper represents a developed cryptographic information protection algorithm based on a substitution permutation network. We describe the cryptographic transformations used in the developed algorithm. One of the features of the algorithm is the simplicity of its modification with regard to different security levels. The algorithm uses a predeveloped S-box tested against differential and linear cryptanalysis. The S-box is consistent with one of the known standards AES and GOST R 34.12-2015. We provide the findings of an avalanche-effect investigation and statistical properties of ciphertexts. The algorithm actually meets the avalanche-effect criterion even after the first round.
Źródło:
International Journal of Electronics and Telecommunications; 2021, 67, 1; 127-132
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-6 z 6

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies