نتایج جستجو برای: distinguishing attack
تعداد نتایج: 109909 فیلتر نتایج به سال:
Context. Gamma-ray bursts are cosmological sources emitting radiation from the gamma-rays to the radio band. Substantial observational efforts have been devoted to the study of gamma-ray bursts during the prompt phase, i.e. the initial burst of high-energy radiation, and during the longlasting afterglows. In spite of many successes in interpreting these phenomena, there are still several open k...
A t-round key-alternating cipher (also called iterated Even-Mansour cipher) can be viewed as an abstraction of AES. It defines a cipher E from t fixed public permutations P1, . . . , Pt : {0, 1} → {0, 1} and a key k = k0‖ · · · ‖kt ∈ {0, 1} by setting Ek(x) = kt⊕Pt(kt−1⊕Pt−1(· · · k1⊕P1(k0⊕ x) · · · )). The indistinguishability of Ek from a truly random permutation by an adversary who also has ...
In this paper, we study the security proofs of GCM (Galois/Counter Mode of Operation). We first point out that a lemma, which is related to the upper bound on the probability of a counter collision, is invalid. Both the original privacy and authenticity proofs by the designers are based on the lemma. We further show that the observation can be translated into a distinguishing attack that invali...
RC4 has remained the most popular software stream cipher since the last two decades. In parallel to cryptanalytic attempts, researchers have come up with many variants of RC4, some targeted to more security, some towards more throughput. We observe that the design of RC4 has been changed a lot in most of the variants. Since the RC4 structure is quite secure if the cipher is used with proper pre...
LetX1,X2, . . . ,Xk be independent n bit random variables. If they have arbitrary distributions, we show how to compute distributions like Pr{X1 ⊕X2 ⊕ · · · ⊕Xk} and Pr{X1 X2 · · · Xk} in complexity O(kn2). Furthermore, if X1,X2, . . . , Xk are uniformly distributed we demonstrate a large class of functions F (X1, X2, . . . ,Xk), for which we can compute their distributions efficiently. These r...
In-network data aggregation in Wireless Sensor Networks (WSNs) provides efficient bandwidth utilization and energy-efficient computing. Supporting efficient in-network data aggregation while preserving the privacy of the data of individual sensor nodes has emerged as an important requirement in numerous WSN applications. For privacypreserving data aggregation in WSNs, He et al. (INFOCOM 2007) h...
We describe new cryptanalytic attacks on the candidate branching program obfuscator proposed by Garg, Gentry, Halevi, Raykova, Sahai and Waters (GGHRSW) using the GGH13 graded encoding, and its variant using the GGH15 graded encoding as specified by Gentry, Gorbunov and Halevi. All our attacks require very specific structure of the branching programs being obfuscated, which in particular must h...
Let G be a permutation group acting on a set V . A partition π of V is distinguishing if the only element of G that fixes each cell of π is the identity. The distinguishing number of G is the minimum number of cells in a distinguishing partition. We prove that if G is a primitive permutation group and |V | ≥ 336, its distinguishing number is two.
The application of the concept of linear cryptanalysis to the domain of key-less primitives is largely an open problem. In this paper we, for the first time, propose a model in which its application is meaningful for distinguishing block ciphers. Combining our model with ideas from message modification and reboundlike approaches, we initiate a study of cryptographic primitives with respect to t...
Traditionally, SPI has been approached from a problem-oriented perspective commonly using models such as the IDEAL and the DMAIC. In contrast, appreciative inquiry is a strength-based approach focusing on bringing forward the best in people and organizations to achieve successful change. While there is significant research on SPI initiatives and the use of problem-oriented approaches there is l...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید