نتایج جستجو برای: distinguishing attack

تعداد نتایج: 109909  

Journal: :IACR Cryptology ePrint Archive 2017
Matthias Hamann Matthias Krause Willi Meier Bin Zhang

Time-memory-data (TMD) tradeoff attacks limit the security level of many classical stream ciphers (like E0, A5/1, Trivium, Grain) to 2 n, where n denotes the inner state length of the underlying keystream generator. This implies that to withstand TMD tradeoff attacks, the state size should be at least double the key size. In 2015, Armknecht and Mikhalev introduced a new line of research, which ...

Journal: :isecure, the isc international journal of information security 0
m. safkhani computer engineering department, shahid rajaee teacher training university, tehran, iran n. bagheri electrical engineering department, shahid rajaee teacher training university, tehran, iran

recently, baghery et al. [1, 2] presented some attacks on two rfid protocols, namely yoon and jung et al. protocols, and proposed the improved version of them. however, in this note, we show that the improved version of the jung et al. protocol suffers from desynchronization attack and the improved version of the yoon's protocol suffers from secret disclosure attack. the success probabilit...

Journal: :IACR Cryptology ePrint Archive 2012
Jiang Zhang Zhenfeng Zhang Yu Chen

In a proxy re-encryption (PRE) scheme, a proxy is given a re-encryption key and has the ability to translate a ciphertext under one key into a ciphertext of the same message under a different key, without learning anything about the message encrypted under either key. PREs have been widely used in many exciting applications, such as email forwarding and law enforcement. Based on a good observat...

2010
Itai Dinur Adi Shamir

We present a new variant of cube attacks called a dynamic cube attack. Whereas standard cube attacks [4] find the key by solving a system of linear equations in the key bits, the new attack recovers the secret key by exploiting distinguishers obtained from cube testers. Dynamic cube attacks can create lower degree representations of the given cipher, which makes it possible to attack schemes th...

Journal: :Electr. J. Comb. 2006
Melody Chan

Let G be a group acting faithfully on a set X. The distinguishing number of the action of G on X, denoted DG(X), is the smallest number of colors such that there exists a coloring of X where no nontrivial group element induces a color-preserving permutation of X. In this paper, we show that if G is nilpotent of class c or supersolvable of length c then G always acts with distinguishing number a...

2015
Kalikinkar Mandal Yin Tan Teng Wu Guang Gong

The authentication and key generation functions play a significant role to guarantee security and privacy in cellular mobile communications. MILENAGE is a set of authentication and key generation functions proposed by the 3 Generation Partnership Project (3GPP). Most recently, the 3GPP Task Force proposed a new set of authentication and key generation functions, called TUAK, as an alternative f...

2005
Manjit Matharu Peter Goadsby

lateral headache that occurs in association with cranial autonomic features. It is an excruciating syndrome and one of the most painful conditions known to humans, with female patients describing each attack as being worse than childbirth. In most patients, it has a striking circannual and circadian periodicity. This disorder has a highly stereotyped clinical phenotype and responds to specific ...

2003
Steve Babbage Christophe De Cannière Joseph Lano Bart Preneel Joos Vandewalle

Sober-t32 is a candidate stream cipher in the NESSIE competition. Some new attacks are presented in this paper. A Guess and Determine attack is mounted against Sober-t32 without the decimation of the key stream by the so-called stuttering phase. Also, two distinguishing attacks are mounted against full Sober-t32. These attacks are not practically feasible, but they are theoretically more effici...

Journal: :Des. Codes Cryptography 2015
Hui Wang Paul Stankovski Thomas Johansson

Feedback with Carry Shift Registers (FCSRs) have previously been available in two configurations, the Fibonacci and Galois architectures. Recently, a generalized and unifying FCSR structure and theory was presented. The new ring FCSRs model repairs some weaknesses of the older architectures. Most notably, the carry cell bias property that was exploited for an attack on the eSTREAM final portfol...

Journal: :Chinese Journal of Electronics 2023

Quantum algorithms are raising concerns in the field of cryptography all over world. A growing number symmetric have been attacked quantum setting. Type-3 generalized Feistel scheme (GFS) and unbalanced with expanding functions (UFS-E) common schemes, which often used cryptographic analysis design. We propose distinguishing attacks on GFS UFS-E chosen plaintext attack The results key recovery b...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید