A Symmetric Key Cryptographic Algorithm

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using Simon's algorithm to attack symmetric-key cryptographic primitives

We present new connections between quantum information and the field of classical cryptography. In particular, we provide examples where Simon’s algorithm can be used to show insecurity of commonly used cryptographic symmetric-key primitives. Specifically, these examples consist of a quantum distinguisher for the 3-round Feistel network and a forgery attack on CBC-MAC which forges a tag for a c...

متن کامل

A DNA-Based Cryptographic Key Generation Algorithm

This paper presents a detail description of a new DNA-based cryptographic key generation algorithm that can be used to generate strong cryptographic key(s) for symmetric ciphering applications. The algorithm uses an initial private/secret key as an input to the Key-Based Random Permutation (KBRP) algorithm to generate a permutation of size n, which is half of the size of the required cryptograp...

متن کامل

A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case

Application Programming Interfaces (APIs) to cryptographic tokens like smartcards and Hardware Security Modules (HSMs) provide users with commands to manage and use cryptographic keys stored on trusted hardware. Their design is mainly guided by industrial standards with only informal security promises. In this paper we propose cryptographic models for the security of such APIs. The key feature ...

متن کامل

Solving a Symmetric Key Cryptographic Problem with Constraint Programming

This paper tries to sum up a starting work at the edge between Cryptography and Constraint Programming. Indeed, many cryptographic problems are solved using Branch & Bound approaches which are implemented from scratch using classical programming languages such as C. This implies quite a lot of programming work. Furthermore, these problems are NP-hard and solving them within a reasonable amount ...

متن کامل

Issues and Challenges in Symmetric Key based Cryptographic Algorithm for Videos and Images

Modern era is fully dependent on internet communication. Through internet we can transfer data anywhere in the world. Through these various activities can be done such as online bill payment, shopping. The network is currently used for carrying personal information as well as financial data. Thus, it is necessary to secure the network, in order that unauthorized person cannot access personal in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2010

ISSN: 0975-8887

DOI: 10.5120/331-502