Showing 41 - 60 results of 74 for search '"Cryptanalysis"', query time: 0.04s Refine Results
  1. 41
  2. 42
  3. 43
  4. 44

    Integral attack on HIGHT block cipher by Jian-sheng GUO, Jing-yi CUI, Zhi-shu PAN, Yi-peng LIU

    Published 2016-07-01
    Subjects: “…cryptanalysis…”
    Get full text
    Article
  5. 45
  6. 46
  7. 47

    Further accelerating the search of differential characteristics based on the SAT method by Zheng XU

    Published 2022-10-01
    Subjects: “…differential cryptanalysis…”
    Get full text
    Article
  8. 48
  9. 49
  10. 50
  11. 51
  12. 52
  13. 53

    Guess and determine attack on E<sub>0</sub>algorithm by Ying-jie ZHAN, Lin DING, Jie GUAN

    Published 2012-11-01
    Subjects: “…cryptanalysis…”
    Get full text
    Article
  14. 54
  15. 55
  16. 56

    Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK by Sugio Nobuyuki

    Published 2023-01-01
    “…Although the authors claimed that RBFK is secure against differential cryptanalysis, linear cryptanalysis, impossible differential attack, and zero correlation linear cryptanalysis, the details were not explained in the literature. …”
    Get full text
    Article
  17. 57

    Algebraic fault attack on PRESENT by Ke-hui WU, Xin-jie ZHAO, Tao WANG, Shi-ze GUO, Hui-ying LIU

    Published 2012-08-01
    “…A new fault analysis method on PRESENT—algebraic fault attack was proposed.This attack combined conventional algebraic cryptanalysis with fault attack,firstly built equivalent Boolean algebraic equations of cipher encryption by algebraic cryptanalysis method; secondly got information of fault cryptograph by fault attack technique,and transformed differential of fault and cryptograph into additional algebraic equations; finally utilized Crypto Mini SAT solver to solve the equations and recover key.Experiments demonstrate that after injecting 4-bit fault to the 29<sup>th</sup> round of PRESENT-80,the fault location and fault value are unknown,only 2 injectings can recover 64-bit last whitening key in 50 seconds that reduce master key of PRESENT-80 searching space to 2<sup>16</sup>,then recover the master key after 1 minute brute-force-search on average; compared with previous fault attack on PRESENT,the amount of this attack sample is the smallest;meanwhile,the analysis method proposed can be applied into the algebraic fault attack of other block ciphers.…”
    Get full text
    Article
  18. 58

    Identification on the structures of block ciphers using machine learning by Ruiqi XIA, Manman LI, Shaozhen CHEN

    Published 2023-06-01
    “…Cryptographic identification is a critical aspect of cryptanalysis and a fundamental premise for key recovery.With the advancement of artificial intelligence, cryptanalysis based on machine learning has become increasingly mature, providing more effective methods and valuable insights for cryptographic identification.The distinguishability experiments were performed based on the Machine Learning to identify the structures of block ciphers in conditions of random keys.The identification of two structures of block ciphers from theoretical and experimental angles was studied.The differences of features in two structures’ cipher texts have been deduced by introducing the runs distribution index, feature distribution functions, KL-divergence, etc.After completing the feasibility research, experiments to identify the structures of two block ciphers using two Machine Learning models and the runs distribution index were conducted.The experiments were divided into two groups: single algorithm group and mixture algorithms group.It is found that the accuracy of both groups are more than 80%, which is around 40% higher than former work.The problem of identifying the structures of Block Ciphers in the conditions of random keys is solved in detail.Meanwhile, differences between the two structures of block ciphers are verified, which can serve as a reference for the design of cryptography algorithms.…”
    Get full text
    Article
  19. 59

    Security on a cryptographic model based on chaos by WEI Jun1, LIAO Xiao-feng2, YANG Ji-yun2

    Published 2008-01-01
    “…The application of chaos in cryptography has attracted much attention,however,most of them were cracked soon after publications.To find why they are so weak under the attack to their chaotic signal streams,some chaotic cryptosystems were investigated.A mathematical model was then derived from these cryptosystems.Attack and corre-sponding improvement were deployed based on the model.The research is validated with a cryptanalysis on a chaotic en-cryption scheme presented by LI S J in Physics Letters A.…”
    Get full text
    Article
  20. 60

    Encryption based on reversible cellular automata by PING Ping, ZHOU Yao, ZHANG Hong, LIU Feng-yu

    Published 2008-01-01
    “…Compared with the general irreversible toggle cellular automata cryptosystem,the proposed method greatly improves the speed of encryption and has large keys space,it can resist bruce attack and differ-ential cryptanalysis.…”
    Get full text
    Article