نتایج جستجو برای: distinguishing attacks
تعداد نتایج: 86712 فیلتر نتایج به سال:
but are probably only deviations from some well recognized typical disease : the older form becoming rare, the variations more frequent." This is in a great measure true with regard to fevers, which have been divided and subdivided into so-called different forms, when in reality they are only deviations from the typical disease. Thus, systematic writers describe a variety of fevers manifested b...
We show that a distinguishing attack in the related key model on an EvenMansour block cipher can readily be converted into an extremely efficient key recovery attack. Concerned ciphers include in particular all iterated Even-Mansour schemes with independent keys. We apply this observation to the Caesar candidate Prøst-OTR and are able to recover the whole key with a number of requests linear in...
In Asiacrypt 2010, Knellwolf, Meier and Naya-Plasencia proposed distinguishing attacks on Grain v1 when (i) Key Scheduling process is reduced to 97 rounds using 2 chosen IVs and (ii) Key Scheduling process is reduced to 104 rounds using 2 chosen IVs. Using similar idea, Banik obtained a new distinguisher for 105 rounds. In this paper, we show similar approach can work for 106 rounds. We present...
Stream ciphers play an important role in symmetric cryptology because of their suitability in high speed applications where block ciphers fall short. A large number of fast stream ciphers or pseudorandom bit generators (PRBGs) can be found in the literature that are based on arrays and simple operations such as modular additions, rotations and memory accesses (e.g. RC4, RC4A, Py, Py6, ISAAC etc...
The authentication and key generation functions play a significant role to guarantee security and privacy in cellular mobile communications. MILENAGE is a set of authentication and key generation functions proposed by the 3 Generation Partnership Project (3GPP). Most recently, the 3GPP Task Force proposed a new set of authentication and key generation functions, called TUAK, as an alternative f...
We propose new key recovery attacks on the two minimal two-round n-bit Even-Mansour ciphers that are secure up to 2 queries against distinguishing attacks proved by Chen et al. Our attacks are based on the meet-in-the-middle technique which can significantly reduce the data complexity. In particular, we introduce novel matching techniques which enable us to compute one of the two permutations w...
Defined in the standard GOST 28147-89, GOST is a Soviet and Russian government standard symmetric-key block cipher. GOST has the 64-bit block size and a key length of 256 bits. It is a Feistel network of 32 rounds. In 2010, GOST was submitted to ISO 18033 to become a worldwide industrial encryption standard. GOST 28147-89 has also been published as informational RFC 5830 with IETF. In this pape...
In this paper, we propose and evaluate a method for generating key-dependent feedback configurations (KDFC) $\sigma $ -LFSRs. -LFSRs with such can be applied to any stream cipher that uses word-based LFSR. Here, configuration generation algorithm the secret key(K) Initialization Vector (IV) gener...
Machine learning is widely used in security applications, particularly in the form of statistical classification aimed at distinguishing benign from malicious entities. Recent research has shown that such classifiers are often vulnerable to evasion attacks, whereby adversaries change behavior to be categorized as benign while preserving malicious functionality. Research into evasion attacks has...
<p>Due to the increasing use of networks at present, Internet systems have raised many security problems, and statistics indicate that rate attacks or intrusions has increased excessively annually, in event any malicious attack on network vulnerabilities information systems, it may lead serious disasters, violating policies security, i.e., “confidentiality, integrity, availability” (CIA)....
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید