A Symmetric Key Cryptographic Algorithm
نویسندگان
چکیده
منابع مشابه
Using Simon's algorithm to attack symmetric-key cryptographic primitives
We present new connections between quantum information and the field of classical cryptography. In particular, we provide examples where Simon’s algorithm can be used to show insecurity of commonly used cryptographic symmetric-key primitives. Specifically, these examples consist of a quantum distinguisher for the 3-round Feistel network and a forgery attack on CBC-MAC which forges a tag for a c...
متن کاملA DNA-Based Cryptographic Key Generation Algorithm
This paper presents a detail description of a new DNA-based cryptographic key generation algorithm that can be used to generate strong cryptographic key(s) for symmetric ciphering applications. The algorithm uses an initial private/secret key as an input to the Key-Based Random Permutation (KBRP) algorithm to generate a permutation of size n, which is half of the size of the required cryptograp...
متن کاملA Modular Treatment of Cryptographic APIs: The Symmetric-Key Case
Application Programming Interfaces (APIs) to cryptographic tokens like smartcards and Hardware Security Modules (HSMs) provide users with commands to manage and use cryptographic keys stored on trusted hardware. Their design is mainly guided by industrial standards with only informal security promises. In this paper we propose cryptographic models for the security of such APIs. The key feature ...
متن کاملSolving a Symmetric Key Cryptographic Problem with Constraint Programming
This paper tries to sum up a starting work at the edge between Cryptography and Constraint Programming. Indeed, many cryptographic problems are solved using Branch & Bound approaches which are implemented from scratch using classical programming languages such as C. This implies quite a lot of programming work. Furthermore, these problems are NP-hard and solving them within a reasonable amount ...
متن کاملIssues and Challenges in Symmetric Key based Cryptographic Algorithm for Videos and Images
Modern era is fully dependent on internet communication. Through internet we can transfer data anywhere in the world. Through these various activities can be done such as online bill payment, shopping. The network is currently used for carrying personal information as well as financial data. Thus, it is necessary to secure the network, in order that unauthorized person cannot access personal in...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2010
ISSN: 0975-8887
DOI: 10.5120/331-502