نتایج جستجو برای: key block method

تعداد نتایج: 2235566  

2011
Ravindra Babu Kallam

In this investigation, we have developed an unbreakable block cipher with extended play color cipher algorithm. This includes multiple transpositions, substitutions, modular arithmetic, integral functions and a 32 characters alphanumeric key. These functions mutate the plain text in various ways before it takes the shape of cipher text. The process of encryption, decryption and the sub key gene...

Journal: :آب و خاک 0
محمد حسین نوری قیداری محسن عبدشریف اصفهانی لیلا ابراهیمی

abstract given the importance of environmental cycles had led to allocation of water-right for water species and ecosystems which is known as environmental flow or in stream flow. from among the various methods for estimating environmental flow, building block approach is considered as a very powerful tool for estimating the water needs. in this paper, beside simplifying the building block appr...

Journal: :Des. Codes Cryptography 2007
Chris J. Mitchell Fred Piper Peter R. Wild

A general method for deriving an identity-based public key cryptosystem from a one-way function is described. We construct both ID-based signature schemes and ID-based encryption schemes. We use a general technique which is applied to multi-signature versions of the one-time signature scheme of Lamport and to a public key encryption scheme based on a symmetric block cipher which we present. We ...

Journal: :IACR Cryptology ePrint Archive 2015
Mehak Khurana Meena Kumari

Block cipher is in vogue due to its requirement for integrity, confidentiality and authentication. Differential and Linear cryptanalysis are the basic techniques on block cipher and till today many cryptanalytic attacks are developed based on these. Each variant of these have different methods to find distinguisher and based on the distinguisher, the method to recover key. This paper illustrate...

1997
John Kelsey Bruce Schneier David A. Wagner

We present new related-key attacks on the block ciphers 3WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. Differential related-key attacks allow both keys and plaintexts to be chosen with specific differences [KSW96]. Our attacks build on the original work, showing how to adapt the general attack to deal with the difficulties of the individual algorithms. We also give specific design principl...

2001
Gregory T. Byrd Nathan Hillery Jim Symon

CellCase is a commercial high-speed encryptor for Asynchronous Transfer Mode (ATM) networks, available since 1997. It provides data confidentiality and entity authentication at the ATM layer, encrypting ATM cell payloads at rates from T1 (1.5 Mb/s) to OC-12c (622 Mb/s). Though deployed prior to the adoption of the ATM Forum Security Specification (1999), CellCase implements many of the mechanis...

Journal: :IACR Transactions on Symmetric Cryptology 2018

Journal: :International Journal on Cryptography and Information Security 2017

2005
Frederik Armknecht

Algebraic attacks on block ciphers and stream ciphers have gained more and more attention in cryptography. Their idea is to express a cipher by a system of equations whose solution reveals the secret key. The complexity of an algebraic attack generally increases with the degree of the equations. Hence, low-degree equations are crucial for the efficiency of algebraic attacks. In the case of simp...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید