نتایج جستجو برای: symmetric key

تعداد نتایج: 629241  

2006
Levente Buttyán Tamás Holczer István Vajda

Key-tree based private authentication has been proposed by Molnar and Wagner as a neat way to efficiently solve the problem of privacy preserving authentication based on symmetric key cryptography. However, in the key-tree based approach, the level of privacy provided by the system to its members may decrease considerably if some members are compromised. In this paper, we analyze this problem, ...

Journal: :I. J. Network Security 2005
Hussein Ahmad Al Hassan Magdy Saeb Hassan Desoky Hamed

The “PYRAMIDS” Block Cipher is a symmetric encryption algorithm of a 64, 128, 256-bit plaintext block, that accepts a variable key length of 128, 192, 256 bits. The algorithm is an iterated cipher consisting of repeated applications of simple round transformations with different operations and different sequences in each round.

2006
Claude Carlet

One of the most basic requirements concerning Boolean functions used in cryptosystems is that they must have high algebraic degrees. This simple criterion is not always well adapted to the concrete situation in which Boolean functions are used in symmetric cryptography, since changing one or several output bits of a Boolean function considerably changes its algebraic degree while it may not cha...

Journal: :Mathematical and Computer Modelling 2010
Michael N. Vrahatis Georgios A. Tsirogiannis Elena C. Laskari

During the last few years considerable effort has been devoted to research related to chaotic encryption. In this paper a new symmetric key cryptosystem that exploits the idea of nonlinear mappings and their fixed points to encrypt information is presented. Furthermore, a measure of the quality of the keys used is introduced. The experimental results indicate that the proposed cryptosystem is e...

2010
Kai Xi Jiankun Hu

7.1 Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 7.1.1 Overview of Cryptography . . . . . . . . . . . 130 7.1.2 Symmetric-Key Cryptography . . . . . . . . 130 7.1.3 Substitution and Transposition Techniques . . . . . . . . . . . . . . . . . . . . . . . . . 131 7.1.4 Data Encryption Standard (DES) . . . . . 133 7.1.5 Advanced Encryption Standard (AES) . 134 7.1.6 Public...

2017
Cody Freitag Jonathan Katz Nathan Klein

The problem of (stateless, symmetric-key) broadcast encryption, in which a central authority sends encrypted content that can be decrypted only by a designated subset of potential receivers, has been the focus of a significant amount of attention. Here, we consider a generalization of this problem in which all members of the group may act as both sender and receiver. The parameters of interest ...

Journal: :CoRR 2017
Dewi Sartika Ginting Kristin Sitompul Jasael Simanulang Rahmat Widia Sembiring Muhammad Zarlis

A R T I C L E I N F O A B S T R A C T Article history: Received: 14 March, 2017 Accepted: 20 April, 2017 Online: 13 June, 2017 Classical cryptography is a way of disguising the news done by the people when there was no computer. The goal is to protect information by way of encoding. This paper describes a modification of classical algorithms to make cryptanalis difficult to steal undisclosed me...

Journal: :Mathematical and Computer Modelling 2011
Ercan Solak Rhouma Rhouma Safya Belghith

We report a break for a recently proposed class of cryptosystems. The cryptosystem uses constant points of a periodic secret orbit to encrypt the plaintext. In order to break the system, it suffices to sort the constant points and find the initial fixed point. We also report breaks for the modified versions of the cryptosystem. Besides, we discuss some efficiency issues of the the cryptosystem.

2007
Joan Daemen René Govaerts Joos Vandewalle

In this paper we apply the cryptographic finite state machine approach as introduced in [1] to the design of symmetric key block ciphers.

Journal: :I. J. Network Security 2008
Wei-Bin Lee Chang-Kuo Yeh

The challenge-response technique is widely adapted for authentication of portable communication systems. For authentication the user can prove his/her identity via a secret shared key. However, this implies that the server requires secure storage and organization of a bulky database for the shared keys of all users. Evidently, such a sensitive and large database increases both maintenance loadi...

2004200520062007200820092010201120122013201420152016201720182019202020212022202302000040000

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید