نتایج جستجو برای: distinguishing attacks

تعداد نتایج: 86712  

2016
Moore

but are probably only deviations from some well recognized typical disease : the older form becoming rare, the variations more frequent." This is in a great measure true with regard to fevers, which have been divided and subdivided into so-called different forms, when in reality they are only deviations from the typical disease. Thus, systematic writers describe a variety of fevers manifested b...

Journal: :IACR Cryptology ePrint Archive 2015
Pierre Karpman

We show that a distinguishing attack in the related key model on an EvenMansour block cipher can readily be converted into an extremely efficient key recovery attack. Concerned ciphers include in particular all iterated Even-Mansour schemes with independent keys. We apply this observation to the Caesar candidate Prøst-OTR and are able to recover the whole key with a number of requests linear in...

Journal: :IACR Cryptology ePrint Archive 2015
Santanu Sarkar

In Asiacrypt 2010, Knellwolf, Meier and Naya-Plasencia proposed distinguishing attacks on Grain v1 when (i) Key Scheduling process is reduced to 97 rounds using 2 chosen IVs and (ii) Key Scheduling process is reduced to 104 rounds using 2 chosen IVs. Using similar idea, Banik obtained a new distinguisher for 105 rounds. In this paper, we show similar approach can work for 106 rounds. We present...

Journal: :IACR Cryptology ePrint Archive 2005
Souradyuti Paul Bart Preneel

Stream ciphers play an important role in symmetric cryptology because of their suitability in high speed applications where block ciphers fall short. A large number of fast stream ciphers or pseudorandom bit generators (PRBGs) can be found in the literature that are based on arrays and simple operations such as modular additions, rotations and memory accesses (e.g. RC4, RC4A, Py, Py6, ISAAC etc...

2015
Kalikinkar Mandal Yin Tan Teng Wu Guang Gong

The authentication and key generation functions play a significant role to guarantee security and privacy in cellular mobile communications. MILENAGE is a set of authentication and key generation functions proposed by the 3 Generation Partnership Project (3GPP). Most recently, the 3GPP Task Force proposed a new set of authentication and key generation functions, called TUAK, as an alternative f...

2017
Takanori Isobe Kyoji Shibutani

We propose new key recovery attacks on the two minimal two-round n-bit Even-Mansour ciphers that are secure up to 2 queries against distinguishing attacks proved by Chen et al. Our attacks are based on the meet-in-the-middle technique which can significantly reduce the data complexity. In particular, we introduce novel matching techniques which enable us to compute one of the two permutations w...

Journal: :IACR Cryptology ePrint Archive 2017
Yi Lu

Defined in the standard GOST 28147-89, GOST is a Soviet and Russian government standard symmetric-key block cipher. GOST has the 64-bit block size and a key length of 256 bits. It is a Feistel network of 32 rounds. In 2010, GOST was submitted to ISO 18033 to become a worldwide industrial encryption standard. GOST 28147-89 has also been published as informational RFC 5830 with IETF. In this pape...

Journal: :IEEE Access 2022

In this paper, we propose and evaluate a method for generating key-dependent feedback configurations (KDFC) $\sigma $ -LFSRs. -LFSRs with such can be applied to any stream cipher that uses word-based LFSR. Here, configuration generation algorithm the secret key(K) Initialization Vector (IV) gener...

2017
Liang Tong Bo Li Chen Hajaj Chaowei Xiao Yevgeniy Vorobeychik

Machine learning is widely used in security applications, particularly in the form of statistical classification aimed at distinguishing benign from malicious entities. Recent research has shown that such classifiers are often vulnerable to evasion attacks, whereby adversaries change behavior to be categorized as benign while preserving malicious functionality. Research into evasion attacks has...

Journal: :International Journal of Power Electronics and Drive Systems 2023

<p>Due to the increasing use of networks at present, Internet systems have raised many security problems, and statistics indicate that rate attacks or intrusions has increased excessively annually, in event any malicious attack on network vulnerabilities information systems, it may lead serious disasters, violating policies security, i.e., “confidentiality, integrity, availability” (CIA)....

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید