Search
Search Results
-
Impossible Differential Cryptanalysis of the FBC Block Cipher
The FBC block cipher is an award-winning algorithm of the recent Cryptographic Algorithm Design Competition in China. It employs a generalised... -
The Security of Quasigroups Based Substitution Permutation Networks
The study of symmetric structures based on quasigroups is relatively new and certain gaps can be found in the literature. In this paper, we want to... -
Performance Analyses of AES and Blowfish Algorithms by Encrypting Files, Videos, and Images
This study attempts to secure the stored images and restrict unauthorized individuals from accessing them to effectively protect the data of the... -
Piecewise symmetric magic cube: application to text cryptography
This article propounds a Piecewise Symmetric Magic Cube (PSMC), the properties of which have reinvigorated its application to text encryption. A...
-
Linear Cryptanalysis of FF3-1 and FEA
Improved attacks on generic small-domain Feistel ciphers with alternating round tweaks are obtained using linear cryptanalysis. This results in... -
Review and Comparison of Lightweight Modifications of the AES Cipher for a Network of Low-Power Devices
AbstractIn contemporary realities, the development of a smart city and cyber–physical systems is impossible without ensuring their information...
-
A Survey: Analysis of Existing Hybrid Cryptographic Techniques
Information of all kinds is widely available right now, especially thanks to the Internet. Security concerns have long drawn attention since the... -
Shrinkable Cryptographic Technique Using Involutory Function for Image Encryption
Cryptography is the technique of hiding and transmitting confidential information via the internet. There are various traditional cryptographic... -
Yoyo attack on 4-round Lai-Massey scheme with secret round functions
In this study, we present the first yoyo attack to recover the secret round function of the 4-round Lai-Massey scheme with an affine orthomorphism....
-
Lightweight encryption for privacy protection of data transmission in cyber physical systems
Cyber-physical system (CPS) devices like connected vehicles, consumer appliances, and many other smart devices are built with limited resources like...
-
CTEA: Chaos based tiny encryption algorithm using ECDH and TinkerBell map for data security in supply chain management
Supply chain management (SCM), an essential part of E-Commerce, is required to plan, control, and procurement raw materials, manufacturing, and...
-
Quantum Speed-Up for Multidimensional (Zero Correlation) Linear Distinguishers
This paper shows how to achieve a quantum speed-up for multidimensional (zero correlation) linear distinguishers. A previous work by Kaplan et... -
WARP : Revisiting GFN for Lightweight 128-Bit Block Cipher
In this article, we present WARP, a lightweight 128-bit block cipher with a 128-bit key. It aims at small-footprint circuit in the field of 128-bit... -
Cryptography
This chapter describes the basic techniques of cryptography as a tool to ensure confidentiality of data. -
A Block Cipher Algorithm Identification Scheme Based on Hybrid Random Forest and Logistic Regression Model
Cryptographic algorithm identification is aimed to analyze the potential feature information in ciphertext data when the ciphertext is known, which...
-
Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3
Format-Preserving Encryption (FPE) schemes accept plaintexts from any finite set of values (such as social security numbers or birth dates) and... -
A lightweight block cipher technique for IoT based E-healthcare system security
All the real and virtual IoT devices are connected to provide intelligent and decision-making services. Each IoT based application is designed for...
-
Quantum Attacks Against Type-1 Generalized Feistel Ciphers and Applications to CAST-256
Generalized Feistel Schemes (GFSs) are important components of symmetric ciphers, which have been extensively studied in the classical setting.... -
Encryption performance and security of certain wide block ciphers
In a context of enhancing the performance of block encryption algorithms there are two well-known approaches. The first one relates to the...
-
Blind Side Channel Analysis Against AEAD with a Belief Propagation Approach
This paper present two new attacks on two lightweight authenticated encryption with associated data (AEAD): Sparkle and...