Cryptographic Applications of the Duplex Construction
نویسنده
چکیده
Assured security is the desirable feature of modern cryptography. Most of modern cryptography primitives have no provably secure constructions. Their safety is defined on the basis of well-known in the given time cryptanalytic attacks. The duplex construction equipped with one ideal permutation and appropriate security parameters is suitable for building provably secure cryptographic primitives. The constructions can be used for unclassified information of different sensitivity levels protection. Some of them can secure classified information up to the “TOP SECRET” level. The applications based on the duplex construction can be used for key wrapping, authenticated encryption and can work as a pseudo-random bit sequence generator. They are not covered by any known intellectual property.
منابع مشابه
Differential Power Analysis: A Serious Threat to FPGA Security
Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...
متن کاملEffect of Thermomechanical Processing on the Microstructure and Mechanical Properties of a Duplex Stainless Steel
Duplex stainless steels (DSSS) have a microstructure composed of ferrite and austenite phases that gives them a very good combination of mechanical and corrosion properties. These steels are desirable for many applications in the chemical and petrochemical industries. In the present study, a type of stainless steel was cast, solution annealed at 1200°C for 60 min and then quenched in water. Ini...
متن کاملBeyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation
BLINKER is a light-weight cryptographic suite and record protocol built from a single permutation. Its design is based on the Sponge construction used by the SHA-3 algorithm KECCAK. We examine the SpongeWrap authenticated encryption mode and expand its padding mechanism to offer explicit domain separation and enhanced security for our specific requirements: shared secret half-duplex keying, enc...
متن کاملsLiSCP: Simeck-Based Permutations for Lightweight Sponge Cryptographic Primitives
In this paper, we propose a family of lightweight cryptographic permutations called sLiSCP, with the sole aim to provide a realistic minimal design that suits a variety of lightweight device applications. More precisely, we argue that for such devices the chip area dedicated for security purposes should, not only be consumed by an encryption or hashing algorithm, but also provide as many crypto...
متن کاملDesign of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method
Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Annales UMCS, Informatica
دوره 14 شماره
صفحات -
تاریخ انتشار 2014