نتایج جستجو برای: impossible differential attack

تعداد نتایج: 397729  

2005
Xiaoyun Wang Hongbo Yu

MD5 is one of the most widely used cryptographic hash functions nowadays. It was designed in 1992 as an improvement of MD4, and its security was widely studied since then by several authors. The best known result so far was a semi free-start collision, in which the initial value of the hash function is replaced by a non-standard value, which is the result of the attack. In this paper we present...

Journal: :IACR Cryptology ePrint Archive 2009
Smile Markovski Aleksandra Mileva Vesna Dimitrova Danilo Gligoroski

A collision attack on NaSHA-512 was proposed by L. Ji et al. The claimed complexity of the attack is 2. The proposed attack is realized by using a suitable differential pattern. In this note we show that the correct result that can be inferred from their differential pattern is in fact a conditional one. It can be stated correctly as follows: A collision attack on NaSHA-512 of complexity k = 1,...

2002
Arindam Mitra

. It was claimed that unconditionally secure quantum bit commitment is impossible due to quantum-computer-assisted-entanglement-attack Recently we have shown that quantum computer-assisted-entanglement-attack can be totally foiled by entanglement and quantum computer. Here we present an alternative un-entanglement based quantum bit commitment scheme. Although the scheme is unconditionally secur...

2011
Gregor Leander Mohamed Ahmed Abdelraheem Hoda AlKhzaimi Erik Zenner

At CHES 2010, the new block cipher PRINTcipher was presented as a light-weight encryption solution for printable circuits [15]. The best attack to date is a differential attack [1] that breaks less than half of the rounds. In this paper, we will present a new attack called invariant subspace attack that breaks the full cipher for a significant fraction of its keys. This attack can be seen as a ...

Journal: :IEICE Transactions on Information and Systems 2019

Journal: :IACR Cryptology ePrint Archive 2009
ZiJie Xu Ke Xu

Hash algorithm is the algorithm that computes a fixed size message digest from arbitrary size messages. After SHA-0 was published, some technologys that analyse and attack hash algorithm is developed. The major technologys is Differential attack. Papers[Wy05, Dau05] has explain the attack. Differential attack is the best technique to attack hash function. To attack hash function, it need do the...

2007
Bruno Robisson Pascal Manet

This paper describes an attack on cryptographic devices called Differential Behavioral Analysis (or DBA). This is an hybrid attack between two already powerful attacks: differential power analysis (DPA) for the statistical treatment and safe-error attack for the fault type. DBA, simulated on an algorithmic model of AES appears to be very efficient. The attacker is able to recover the entire sec...

Journal: :IACR Cryptology ePrint Archive 2016
Bing Sun Meicheng Liu Jian Guo Vincent Rijmen Ruilin Li

Impossible differential and zero correlation linear cryptanalysis are two of the most important cryptanalytic vectors. To characterize the impossible differentials and zero correlation linear hulls which are independent of the choices of the non-linear components, Sun et al. proposed the structure deduced by a block cipher at CRYPTO 2015. Based on that, we concentrate in this paper on the secur...

Journal: :Computer Networks 1999
Vinod Anupam Alain J. Mayer Kobbi Nissim Benny Pinkas Michael K. Reiter

We present a hit inflation attack on pay-per-click Web advertising schemes. Our attack is virtually impossible for the program provider to detect conclusively, regardless of whether the provider is a third-party ‘ad network’ or the target of the click itself. If practiced widely, this attack could accelerate a move away from pay-per-click programs and toward programs in which referrers are paid...

Journal: :IEEE Transactions on Information Forensics and Security 2020

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید