-
41
State recovery attack on ACORN v3 in nonce-reuse setting
Published 2020-08-01Subjects: Get full text
Article -
42
-
43
Differential security evaluation of Piccolo-like structure
Published 2022-02-01Subjects: Get full text
Article -
44
Integral attack on HIGHT block cipher
Published 2016-07-01Subjects: “…cryptanalysis…”
Get full text
Article -
45
Research on linear approximations of simplified Trivium
Published 2016-06-01Subjects: Get full text
Article -
46
Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems
Published 2023-05-01Subjects: Get full text
Article -
47
Further accelerating the search of differential characteristics based on the SAT method
Published 2022-10-01Subjects: “…differential cryptanalysis…”
Get full text
Article -
48
-
49
Differential fault analysis on the SMS4 cipher by inducing faults to the key schedule
Published 2008-01-01Subjects: “…cryptanalysis…”
Get full text
Article -
50
Statistical ineffective fault analysis of the lightweight authenticated cipher algorithm Saturnin-Short
Published 2023-04-01Subjects: Get full text
Article -
51
New certificateless aggregate signature scheme with universal designated verifier
Published 2017-11-01Subjects: “…cryptanalysis…”
Get full text
Article -
52
Improvement and evaluation for algebraic fault attacks on PRESENT
Published 2016-08-01Subjects: “…algebraic cryptanalysis…”
Get full text
Article -
53
Guess and determine attack on E<sub>0</sub>algorithm
Published 2012-11-01Subjects: “…cryptanalysis…”
Get full text
Article -
54
A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges
Published 2025-01-01Subjects: Get full text
Article -
55
Impossible differential cryptanalysis of reduced-round <inline-formula><alternatives><math xmlns:mml="http://www.w3.org/1998/Math/MathML" id="M2"><msup><mrow><mi mathvariant="bold-italic">μ</mi></mrow><mrow><mn mathvariant="normal">2</mn></mrow></msup></math><graphic specific-use="big" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="alternativeImage/22C9D519-EA4F-4e54-A8CF-1ACB826F2179-M002.jpg"><?...
Published 2024-11-01Subjects: “…impossible differential cryptanalysis…”
Get full text
Article -
56
Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK
Published 2023-01-01“…Although the authors claimed that RBFK is secure against differential cryptanalysis, linear cryptanalysis, impossible differential attack, and zero correlation linear cryptanalysis, the details were not explained in the literature. …”
Get full text
Article -
57
Algebraic fault attack on PRESENT
Published 2012-08-01“…A new fault analysis method on PRESENT—algebraic fault attack was proposed.This attack combined conventional algebraic cryptanalysis with fault attack,firstly built equivalent Boolean algebraic equations of cipher encryption by algebraic cryptanalysis method; secondly got information of fault cryptograph by fault attack technique,and transformed differential of fault and cryptograph into additional algebraic equations; finally utilized Crypto Mini SAT solver to solve the equations and recover key.Experiments demonstrate that after injecting 4-bit fault to the 29<sup>th</sup> round of PRESENT-80,the fault location and fault value are unknown,only 2 injectings can recover 64-bit last whitening key in 50 seconds that reduce master key of PRESENT-80 searching space to 2<sup>16</sup>,then recover the master key after 1 minute brute-force-search on average; compared with previous fault attack on PRESENT,the amount of this attack sample is the smallest;meanwhile,the analysis method proposed can be applied into the algebraic fault attack of other block ciphers.…”
Get full text
Article -
58
Identification on the structures of block ciphers using machine learning
Published 2023-06-01“…Cryptographic identification is a critical aspect of cryptanalysis and a fundamental premise for key recovery.With the advancement of artificial intelligence, cryptanalysis based on machine learning has become increasingly mature, providing more effective methods and valuable insights for cryptographic identification.The distinguishability experiments were performed based on the Machine Learning to identify the structures of block ciphers in conditions of random keys.The identification of two structures of block ciphers from theoretical and experimental angles was studied.The differences of features in two structures’ cipher texts have been deduced by introducing the runs distribution index, feature distribution functions, KL-divergence, etc.After completing the feasibility research, experiments to identify the structures of two block ciphers using two Machine Learning models and the runs distribution index were conducted.The experiments were divided into two groups: single algorithm group and mixture algorithms group.It is found that the accuracy of both groups are more than 80%, which is around 40% higher than former work.The problem of identifying the structures of Block Ciphers in the conditions of random keys is solved in detail.Meanwhile, differences between the two structures of block ciphers are verified, which can serve as a reference for the design of cryptography algorithms.…”
Get full text
Article -
59
Security on a cryptographic model based on chaos
Published 2008-01-01“…The application of chaos in cryptography has attracted much attention,however,most of them were cracked soon after publications.To find why they are so weak under the attack to their chaotic signal streams,some chaotic cryptosystems were investigated.A mathematical model was then derived from these cryptosystems.Attack and corre-sponding improvement were deployed based on the model.The research is validated with a cryptanalysis on a chaotic en-cryption scheme presented by LI S J in Physics Letters A.…”
Get full text
Article -
60
Encryption based on reversible cellular automata
Published 2008-01-01“…Compared with the general irreversible toggle cellular automata cryptosystem,the proposed method greatly improves the speed of encryption and has large keys space,it can resist bruce attack and differ-ential cryptanalysis.…”
Get full text
Article