Message Based Random Variable Length Key Encryption Algorithm

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Message Based Random Variable Length Key Encryption Algorithm

Problem statement: A block ciphers provides confidentiality in cryptography but cryptanalysis of the classical block ciphers demonstrated some old weaknesses grabbing a partial key in any stage of encryption procedure leads to reconstructing the whole key. Exhaustive key search shows that key generation should be indeterminist and random for each round. Matching cipher-text attack shows that la...

متن کامل

A Key Dependent Encryption Algorithm Based on Multiple Bitwise-Shuffling and XOR Variable-Length Partitions

Email: [email protected] Abstract: This new algorithm employs shuffling procedures combined with variable-length key-dependent XOR and S-box substitutions to perform lossless image encryption. This algorithm was implemented and tested by performing different permutations of shuffling, XOR encryption and S-box substitution. Empirical analysis using different types of test images of different s...

متن کامل

Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message

OAEP and other similar schemes proven secure in Random-Oracle Model require one or more hash functions with output size larger than those of standard hash functions. In this paper, we show that by utilizing popular Sponge constructions in OAEP framework, we can eliminate the need of such hash functions. We provide a new scheme in OAEP framework based on Sponge construction and call our scheme S...

متن کامل

Modified Cellular Message Encryption Algorithm

This paper analyzes the Modified Cellular Message Encryption Algorithm (M-CMEA) which is an enhanced version of the Telecommunication Industry Association’s Cellular Message Encryption Algorithm. We analyzed more properties to, “Why is CMEA weak?” and modification required to secure the CMEA.

متن کامل

Customizing Cellular Message Encryption Algorithm

This paper observes the cryptanalysis of the Telecommunications Industry Association’s Cellular Message Encryption Algorithm (CMEA). The CMEA has been widely used for wireless security and the breaking of the scheme proves the requirement of alternatives. In the current paper, the properties of CMEA which have lead to the successful cryptanalysis, have been identified. Accordingly the algorithm...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Computer Science

سال: 2009

ISSN: 1549-3636

DOI: 10.3844/jcssp.2009.573.578