نتایج جستجو برای: cipher text only attack

تعداد نتایج: 1566384  

2010
Asli Bay Jorge Nakahara Serge Vaudenay

This paper presents the first independent and systematic linear, differential and impossible-differential (ID) cryptanalyses of MIBS, a lightweight block cipher aimed at constrained devices such as RFID tags and sensor networks. Our contributions include linear attacks on up to 18-round MIBS, and the first ciphertext-only attacks on 13-round MIBS. Our differential analysis reaches 14 rounds, an...

1998
Alex Biryukov Eyal Kushilevitz

We present a method for efficient conversion of differential (chosen plaintext) attacks into the more practical known plaintext and ciphertext-only attacks. Our observation may save up to a factor of 2 in data over the known methods, assuming that plaintext is ASCII encoded English (or some other types of highly redundant data). We demonstrate the effectiveness of our method by practical attack...

Journal: :CoRR 2017
Hamzeh Ghasemzadeh Mehdi Tajik Khass Hamed Mehrara

Recently it was shown that permutation-only multimedia ciphers can completely be broken in a chosenplaintext scenario. Apparently, chosen-plaintext scenario models a very resourceful adversary and does not hold in many practical situations. To show that these ciphers are totally broken, we propose a cipher-text only attack on these ciphers. To that end, we investigate speech permutation-only ci...

2013
Sushma Pradhan Birendra Kumar Sharma Ravi Shankar Shukla

A new public key cryptosystem is presented which is based on Equivalent-RSA that is provably secure against adaptive chosen cipher text attack (as defined by Rackoff [22]).

Journal: :EURASIP J. Adv. Sig. Proc. 2013
Nasour Bagheri Reza Ebrahimpour Navid Ghaedi

In this paper, we present two differential fault analyses on PRESENT-80 which is a lightweight block cipher. The first attack is a basic attack which induces a fault on only one bit of intermediate states, and we can obtain the last subkey of the block cipher, given 48 faulty cipher texts on average. The second attack can retrieve the master key of the block cipher, given 18 faulty cipher texts...

2002
JAN BOUDA

We extensively discuss the problem of encryption of quantum information. We present an attack on the private quantum channel which applies when partial classical description of the cipher text is known (the known-ciphertext attack) and show how to avoid this situation. The quantum analogue of the known-plaintext attack is also discussed.

2012
Sojwal S. Kulkarni Sanjay Singla

The combination of cryptography and fuzzy logic has emerged as a promising component of information security. Acknowledge based model is introduced in the information security. This method includes a substitution cipher known as polyalphabetic cipher. The information that is trying to send is including the text that is alphabets. The existing Substitution cipher known as Vigenere cipher algorit...

2017
Vikas Tiwari Priyanka Garg Ajeet Singh

Differential Cryptanalysis is a powerful technique in cryptanalysis, applied to symmetric-key block ciphers. It is a chosen plain-text attack which means the cryptanalyst has some sets of the plain-text and the corresponding cipher-text pairs of his choice. These pairs of the plain-text are related by a constant difference. Basically it is the study of how differences in input information can a...

Journal: :Cryptologia 2005
Geoff Sullivan Frode Weierud

A large number of encrypted German Army radio messages, from 1941 and 1945, have survived the end of the Second World War to the present day. Most of these messages are enciphered on the three-wheel, steckered Wehrmacht Enigma. We present an account of a ciphertext-only cryptanalysis of these messages and give details of the Enigma procedures used in the networks.

In the biclique attack, a shorter biclique usually results in less data complexity, but at the expense of more computational complexity. The early abort technique can be used in partial matching part of the biclique attack in order to slightly reduce the computations. In this paper, we make use of this technique, but instead of slight improvement in the computational complexity, we keep the amo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید