نتایج جستجو برای: box key

تعداد نتایج: 632676  

Journal: :IACR Cryptology ePrint Archive 2013
James A. Muir

White-box cryptography concerns the design and analysis of implementations of cryptographic algorithms engineered to execute on untrusted platforms. Such implementations are said to operate in a white-box attack context. This is an attack model where all details of the implementation are completely visible to an attacker: not only do they see input and output, they see every intermediate comput...

Journal: :CoRR 2014
Omer K. Jasim Mohammad Safia Abbas El-Sayed M. El-Horbaty Abdel-Badeeh M. Salem

With the extraordinary maturity of data exchange in network environments and increasing the attackers capabilities, information security has become the most important process for data storage and communication. In order to provide such information security the confidentiality, data integrity, and data origin authentication must be verified based on cryptographic encryption algorithms. This pape...

2012
Babu M

In this current fast moving world, getting the information faster is more important. My project makes it happen. SMS4 cipher based on Pipelined Twisted BDD (Binary Decision Diagram) S-box architecture can convert the plain text into cipher text as fast as other S-box architecture. SMS4 is a 128-bit block cipher used in the WAPI standard for protecting data packets in WLAN. In this project S-box...

Journal: :IACR Cryptology ePrint Archive 2017
Lorenzo Grassi

At Eurocrypt 2017 the first secret-key distinguisher for 5-round AES has been presented. Although it allows to distinguish a random permutation from an AES-like one, it seems (rather) hard to exploit such a distinguisher in order to implement a key-recovery attack different than brute-force like. In this paper we introduce “Mixture Differential Cryptanalysis”, a new technique to set up new secr...

Journal: :IACR Cryptology ePrint Archive 2006
Wei Han Dong Zheng Kefei Chen

Temporal Key Integrity Protocol (TKIP) is a sub-protocol of IEEE 802.11i. TKIP remedies some security flaws in Wired Equivalent Privacy (WEP) Protocol. TKIP adds four new algorithms to WEP: a Message Integrity Code (MIC) called Michael, an Initialization Vector (IV) sequencing discipline, a key mixing function and a re-keying mechanism. The key mixing function, also called temporal key hash, de...

2005
Ching-Hua Chuan Elaine Chew

Our key finding system consists of a series of O(n) realtime algorithms for determining key from polyphonic audio. The system comprises of two main parts as shown in Figure 1 [1]. The first part (the upper dashed box) generates pitch class information from audio using the standard FFT and a fuzzy analysis technique. The second component (the lower dashed box) uses the pitch class information to...

2008
Peng Wang Dengguo Feng Wenling Wu Liting Zhang

Side-channel attacks are a very powerful cryptanalytic technique. Li and Gu [ProvSec’07] proposed an approach against side-channel attacks, which states that a symmetric encryption scheme is IND-secure in side-channel model, if it is IND-secure in black-box model and there is no adversary who can recover the whole key of the scheme computationally in side-channel model, i.e. WKR-SCA ∧ IND → IND...

2012
Goichiro Hanaoka Takahiro Matsuda Jacob C. N. Schuldt

In this paper, we discuss the (im)possibility of constructing chosen ciphertext secure (CCA secure) key encapsulation mechanisms (KEMs) with low ciphertext overhead. More specifically, we rule out the existence of algebraic black-box reductions from the (bounded) CCA security of a natural class of KEMs to any non-interactive problem. The class of KEMs captures the structure of the currently mos...

Journal: :Information 2015
Xingbing Fu Xuyun Nie Fagen Li

In the existing attribute-based encryption (ABE) scheme, the authority (i.e., private key generator (PKG)) is able to calculate and issue any user’s private key, which makes it completely trusted, which severely influences the applications of the ABE scheme. To mitigate this problem, we propose the black box traceable ciphertext policy attribute-based encryption (T-CP-ABE) scheme in which if th...

2014
Takahiro Matsuda

One of the fundamental research themes in cryptography is to clarify what the minimal assumptions to realize various kinds of cryptographic primitives are, and up to now, a number of relationships among primitives have been investigated and established. Among others, it has been suggested (and sometimes explicitly claimed) that a family of one-way trapdoor permutations (TDP) is sufficient for c...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید