Ongoing Research Areas in Symmetric
نویسنده
چکیده
Project co-funded by the European Commission within the 6th Framework Programme Dissemination Level PU Public X PP Restricted to other programme participants (including the Commission services) RE Restricted to a group specified by the consortium (including the Commission services) CO Confidential, only for members of the consortium (including the Commission services) The information in this document is provided as is, and no warranty is given or implied that the information is fit for any particular purpose. The user thereof uses the information at its sole risk and liability. Basic cryptographic algorithms split into two families: symmetric algorithms, otherwise known as secret-key algorithms, which normally require a key to be shared and simultaneously kept secret within a restricted group, and public-key algorithms where the private key is almost never shared. From outside, this may give the impression that symmetric techniques become obsolete after the invention of public-key cryptography in the mid 1970's. However, symmetric techniques are still widely used because they are the only ones that can achieve some major functionalities as high-speed or low-cost encryption, fast authentication, and efficient hashing. Today, we find symmetric algorithms in GSM mobile phones, in credit cards, in WLAN connections, and symmetric cryptology is a very active research area. There is a strong need for further research in this area. On the one hand, new industrial needs are arising with the development of new application environments. For instance, the demand for low-cost primitives dedicated to low-power devices is pressing. On the other hand, progress in cryptanalysis may threaten the security of some existing and widely used algorithms. A better understanding of recent attacks is then necessary for the evaluation of existing primitives and for designing new and more secure ones. This report gives a brief summary of some of the research trends in symmetric cryptography at the time of writing, and the present report is the revision of Y3. The following aspects of symmetric cryptography are investigated in this report: • the status of work with regards to different types of symmetric algorithms, including block ciphers, stream ciphers, hash functions and MAC algorithms (Section 1); • the recently proposed algebraic attacks on symmetric primitives (Section 2); • the design criteria for symmetric ciphers (Section 3); • the provable properties of symmetric primitives (Section 4); • the major industrial needs in the area of symmetric cryptography (Section 5). Four major aspects have been identified and will …
منابع مشابه
PET vs. SPECT: in the context of ongoing developments
This paper intends to compare the abilities of the two major imaging modalities in nuclear medicine imaging: Positron Emission Tomography (PET) and Single Photon Emission Computed Tomography (SPECT). The motivations are many-fold: (i) To gain a better understanding of the strengths and limitations of the two imaging modalities in the context of recent and ongoing developments in hardware ...
متن کاملPerspectives on Rebuilding Health System Governance in Opposition-Controlled Syria: A Qualitative Study
Background Ongoing conflict and systematic targeting of health facilities and personnel by the Syrian regime in opposition-controlled areas have contributed to health system and governance mechanisms collapse. Health directorates (HDs) were established in opposition-held areas in 2014 by the interim (opposition) Ministry of Health (MoH), to meet emerging needs. As the local health authori...
متن کاملSymmetric Cryptography Dagstuhl Seminar
From .. to .., the Dagstuhl Seminar 07021 Symmetric Cryptography was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put toget...
متن کاملSymplectic and symmetric methods for the numerical solution of some mathematical models of celestial objects
In the last years, the theory of numerical methods for system of non-stiff and stiff ordinary differential equations has reached a certain maturity. So, there are many excellent codes which are based on Runge–Kutta methods, linear multistep methods, Obreshkov methods, hybrid methods or general linear methods. Although these methods have good accuracy and desirable stability properties such as A...
متن کاملSymmetric Cryptography 1 Executive Summary
From January 10–15, 2016, the seminar 16021 in Symmetric Cryptography was held in Schloss Dagstuhl – Leibniz Center for Informatics. It was the fifth in the series of the Dagstuhl seminars “Symmetric Cryptography” held in 2007, 2009, 2012, and 2014. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the pres...
متن کاملOngoing Research Areas in Symmetric Cryptography
Project co-funded by the European Commission within the 6th Framework Programme Dissemination Level PU Public X PP Restricted to other programme participants (including the Commission services) RE Restricted to a group specified by the consortium (including the Commission services) CO Confidential, only for members of the consortium (including the Commission services) The information in this do...
متن کامل