-
81
A New One-Dimensional Chaotic Map and Its Use in a Novel Real-Time Image Encryption Scheme
Published 2014-01-01“…In addition, to argue for the good cryptographic properties of the proposed map, we have tested the randomness of the values generated by its orbit using NIST statistical suite. …”
Get full text
Article -
82
Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services
Published 2024-01-01“…The proposed PRKCHB method involves user registration, cryptographic hash blockchain, and regression analysis. …”
Get full text
Article -
83
Algebraic fault attack on PRESENT
Published 2012-08-01“…A new fault analysis method on PRESENT—algebraic fault attack was proposed.This attack combined conventional algebraic cryptanalysis with fault attack,firstly built equivalent Boolean algebraic equations of cipher encryption by algebraic cryptanalysis method; secondly got information of fault cryptograph by fault attack technique,and transformed differential of fault and cryptograph into additional algebraic equations; finally utilized Crypto Mini SAT solver to solve the equations and recover key.Experiments demonstrate that after injecting 4-bit fault to the 29<sup>th</sup> round of PRESENT-80,the fault location and fault value are unknown,only 2 injectings can recover 64-bit last whitening key in 50 seconds that reduce master key of PRESENT-80 searching space to 2<sup>16</sup>,then recover the master key after 1 minute brute-force-search on average; compared with previous fault attack on PRESENT,the amount of this attack sample is the smallest;meanwhile,the analysis method proposed can be applied into the algebraic fault attack of other block ciphers.…”
Get full text
Article -
84
Spatiotemporal chaotic one-way Hash function construction based on coupled tent maps
Published 2007-01-01“…A novel coupled tent maps-based spatiotemporal chaotic cryptographic Hash function was proposed.Compared with the discrete tent map,the coupled discrete tent spatiotemporal chaotic maps have longer computer-realization-period,nearly uniform distribution and desired diffusion and confusion properties.Based on the coupled discrete tent spatiotemporal chaotic maps,a cryptographic Hashing function is constructed to generate 128-bit Hash value from a message with arbitrary length.The approach uses the initial value of coupled discrete tent chaotic dynamical system iteration as the secret key.The key space is very large.There is a high sensitivity and complex and strongly nonlinear coupling relation between the Hash value and the corresponding message and secret key.Theoretic analysis and simulation results are shown that the approach possess not only extremely high security in comparison with earlier chaotic Hash functions,but also the high execution speed.Therefore,the approach can satisfy all the performance requirements of Hash function,such as one-way,key sensitivity and collision resistance.…”
Get full text
Article -
85
Redesigning the Serpent Algorithm by PA-Loop and Its Image Encryption Application
Published 2023-01-01“…This article presents a cryptographic encryption standard whose model is based on Serpent presented by Eli Biham, Ross Anderson, and Lars Knudsen. …”
Get full text
Article -
86
Geometric Data Perturbation-Based Personal Health Record Transactions in Cloud Computing
Published 2015-01-01“…Current techniques for encryption primarily rely on conventional cryptographic approaches. However, key management issues remain largely unsolved with these cryptographic-based encryption techniques. …”
Get full text
Article -
87
An efficient construction of key-dependent substitution box based on chaotic sine map
Published 2019-12-01“…The experimental results confirmed that the proposed method to construct substitution box has acceptable cryptographic properties to resist against various cryptanalysis.…”
Get full text
Article -
88
Improved 2D Discrete Hyperchaos Mapping with Complex Behaviour and Algebraic Structure for Strong S-Boxes Generation
Published 2020-01-01“…This paper proposes to present a novel method of generating cryptographic dynamic substitution-boxes, which makes use of the combined effect of discrete hyperchaos mapping and algebraic group theory. …”
Get full text
Article -
89
Research on the security of national secret algorithm based compute first networking
Published 2023-08-01“…With the promotion of national secret algorithm, in-depth research on the arithmetic network was carried out, a more efficient and reasonable security scheme for the arithmetic network was proposed, ensuring the data security and privacy of the arithmetic network with the help of the state secret algorithm.The main elements of the design program included: Supporting arithmetic demand and cryptographic invocation through the underlying resources, the arithmetic orchestration layer provided the ability to orchestrate data arithmetic, meanwhile, the arithmetic scheduling layer intelligently discerned the optimal nodes for arithmetic resource scheduling and allocation; the cryptographic reinforcement layer used the national secret algorithm based on hardware support with the help of public key cryptosystem, hash function, digital envelope, homomorphic encryption, blockchain and other technologies.Focusing on arithmetic network access security, transmission security, data security and privacy protection aspects of security implementation.An architecture and application form was innovatively proposed to guarantee the data security of the arithmetic network, which could meet the needs of the application layer arithmetic in the scenarios of big data, intelligent technology, etc..The security of the arithmetic network is enhanced by empowering the arithmetic network through the state-secret algorithm.…”
Get full text
Article -
90
Enhancing Democratic Processes: A Survey of DRE, Internet, and Blockchain in Electronic Voting Systems
Published 2025-01-01“…In so doing, we provide an understanding of cryptographic primitives employed in e-voting systems and how they address specific characteristics and challenges associated with each voting scheme. …”
Get full text
Article -
91
Medical Image Encryption and Decryption Based on DNA: A Survey
Published 2023-09-01“…DNA Digital coding is the most popular form of cryptographic technology, and it is frequently employed to strengthen information security, and the most prevalent constraints of DNA cryptographic schemes feature a high degree of temporal and algor. …”
Get full text
Article -
92
Lightweight PUF-based anonymous authentication protocol in V2G
Published 2024-10-01“…The proposed protocol employed Hash functions and the ASCON cryptographic algorithm to achieve rapid three-party authentication and key negotiation among vehicles, charging stations, and energy providers. …”
Get full text
Article -
93
In-depth study of lightweight block ciphers: Performance assessment and implementation on sensor motes
Published 2025-02-01“…Block ciphers, which are fundamental cryptographic algorithms used for encrypting data, play a critical role in ensuring data security within these environments. …”
Get full text
Article -
94
Chaotic Stream Cipher-Based Secure Data Communications over Intelligent Transportation Network
Published 2015-01-01“…The proposed cryptographic scheme allowed ITS to achieve key negotiation and data encryption between sensor nodes in the WSN, whileas reduced computational costs and power consumption. …”
Get full text
Article -
95
Enhancing the robustness of block ciphers through a graphical S-box evolution scheme for secure multimedia applications
Published 2024-12-01“…Robustness and assurance of the security competency necessary to block ciphers are provided by the cryptographically strong S-boxes. A novel coset graph-based algebraic method was proposed to evolve a robust and efficient S-box in order to address the challenges of strong S-box generation. …”
Get full text
Article -
96
Class of constructions of even variables Boolean function with optimum algebraic immunity
Published 2009-01-01“…A second order recursive construction of even variables Boolean function with optimum algebraic immunity was proposed.It could be observed that the constructed Boolean functions have well cryptographic properties,such as good balance,high algebraic degree and high nonlinearity.Further more,it was generalized to a class of constructions for Boolean functions with optimum algebraic immunity.…”
Get full text
Article -
97
Improving dependability with low power fault detection model for skinny-hash.
Published 2024-01-01“…IoT devices are secured by cryptographic algorithms, but their dependability is a major concern. …”
Get full text
Article -
98
Serial test is superior to the traditional sequences random tests
Published 2007-01-01“…Random sequences play an important role in cryptographic research.NIST publishes 16 standard tests in March,2001 to test the randomness of binary sequences.Serial test is included in the 16 tests but the traditional ordered-pair test and poker test are not.Serial test was analyzed to be superior to the other two tests even when they are used together.So it can replace them and be selected by NIST.…”
Get full text
Article -
99
Identification on the structures of block ciphers using machine learning
Published 2023-06-01“…Cryptographic identification is a critical aspect of cryptanalysis and a fundamental premise for key recovery.With the advancement of artificial intelligence, cryptanalysis based on machine learning has become increasingly mature, providing more effective methods and valuable insights for cryptographic identification.The distinguishability experiments were performed based on the Machine Learning to identify the structures of block ciphers in conditions of random keys.The identification of two structures of block ciphers from theoretical and experimental angles was studied.The differences of features in two structures’ cipher texts have been deduced by introducing the runs distribution index, feature distribution functions, KL-divergence, etc.After completing the feasibility research, experiments to identify the structures of two block ciphers using two Machine Learning models and the runs distribution index were conducted.The experiments were divided into two groups: single algorithm group and mixture algorithms group.It is found that the accuracy of both groups are more than 80%, which is around 40% higher than former work.The problem of identifying the structures of Block Ciphers in the conditions of random keys is solved in detail.Meanwhile, differences between the two structures of block ciphers are verified, which can serve as a reference for the design of cryptography algorithms.…”
Get full text
Article -
100
Authenticated encryption mode with blocks skipping
Published 2021-10-01“…At the same time, in addition to the structure of the applied block symmetric cipher, the cryptographic strength and performance of the information protection system is largely determined by the applied encryption mode. …”
Get full text
Article