نتایج جستجو برای: cipher text only attack

تعداد نتایج: 1566384  

Journal: :Baghdad Science Journal 2011

2003
Hongjun Wu Feng Bao Robert H. Deng

Yi et al. have proposed a cipher called the fast encryption algorithm for multimedia (FEA-M). Recently Mihaljević and Kohno pointed out that FEA-M is insecure. However, their attacks are not efficient: their chosen plaintext attack and known plaintext attack require 2-bit chosen plaintext and 2-bit known plaintext, respectively. In this paper we give an efficient known plaintext attack against ...

Journal: :Experimental Mathematics 2005
Ryan Harkins Eric Weber Andrew Westmeyer

We propose a cipher similar to the One Time Pad and McEliece cipher based on a subband coding scheme. The encoding process is an approximation to the One Time Pad encryption scheme. We present results of numerical experiments which suggest that a brute force attack to the proposed scheme does not result in all possible plaintexts, as the One Time Pad does, but still the brute force attack does ...

2004
Ludger Hemme

Previously proposed differential fault analysis (DFA) techniques against iterated block ciphers mostly exploit computational errors in the last few rounds of the cipher to extract the secret key. In this paper we describe a DFA attack that exploits computational errors in early rounds of a Feistel cipher. The principle of the attack is to force collisions by inducing faults in intermediate resu...

Journal: :IACR Cryptology ePrint Archive 2014
Mohammad Sadegh Nemati Nia Ali Payandeh

SNOW 2.0 is a word oriented stream cipher that has been selected as a standard stream cipher on ISO/IEC 18033-4. One of the general attacks on the stream ciphers is Guess and Determine attack. Heuristic GD attack is GD attack that represents an algorithmic method to analysis the stream cipher with the variables of the same size. The results of HGD attack on TIPSY, SNOW 1.0 and SNOW 2.0 stream c...

Journal: :IACR Cryptology ePrint Archive 2004
Kai Wirt

The Common Scrambling Algorithm (CSA) is used to encrypt streams of video data in the Digital Video Broadcasting (DVB) system. The algorithm uses a combination of a stream and a block cipher, apparently for a larger security margin. However these two algorithms share a common key. In this paper we present a fault attack on the block cipher which can be launched without regarding the stream ciph...

Journal: :EURASIP J. Wireless Comm. and Networking 2006
Chetan Nanjunda Mathur Karthik Narayan K. P. Subbalakshmi

Securing transmission over a wireless network is especially challenging, not only because of the inherently insecure nature of the medium, but also because of the highly error-prone nature of the wireless environment. In this paper, we take a joint encryptionerror correction approach to ensure secure and robust communication over the wireless link. In particular, we design an errorcorrecting ci...

2008
Michal Hojsík Bohuslav Rudolf

One of the eSTREAM final portfolio ciphers is the hardwareoriented stream cipher Trivium. It is based on 3 nonlinear feedback shift registers with a linear output function. Although Trivium has attached a lot of interest, it remains unbroken by passive attacks. At FSE 2008 a differential fault analysis of Trivium was presented. It is based on the fact that one-bit fault induction reveals many p...

Journal: :IACR Cryptology ePrint Archive 2017
Masahiro Yagisawa

Gentry’s bootstrapping technique is the most famous method of obtaining fully homomorphic encryption. In previous work I proposed a fully homomorphic encryption without bootstrapping which has the weak point in the enciphering function. In this paper I propose the improved fully homomorphic public-key encryption scheme on non-associative octonion ring over finite field without bootstrapping tec...

Journal: :IACR Cryptology ePrint Archive 2013
Mohammad Ali Orumiehchiha Josef Pieprzyk Ron Steinfeld

NLM generator, designed by HoonJae Lee, SangMin Sung, HyeongRag Kim, is the strengthened version of the LM-type summation generator with two memory bits; which uses non-linear combination of linear feedback shift register and non-linear feedback shift register. Recently, the cipher along with a massage authenticate function have been proposed for a lightweight communication framework in wireles...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید