نتایج جستجو برای: differential attack

تعداد نتایج: 363211  

2005
YONGJIN YEOM

Integral cryptanalysis and higher order differential attack are chosen(or known) plaintext attacks on block ciphers. These attacks have been developed independently and become widely used as strong tools to analyze the security of block ciphers. In this paper, basic idea of these attacks including brief historical comments is described. We give some recent applications of integral cryptanalysis...

2012
Nicolas Courtois

GOST 28147-89 is a well-known block cipher and the official encryption standard of the Russian Federation. A 256-bit block cipher considered as an alternative for AES-256 and triple DES, having an amazingly low implementation cost and is becoming increasingly popular [?,15]. Until 2010 researchers unanimously agreed that: “despite considerable cryptanalytic efforts spent in the past 20 years, G...

Journal: :Science 1971
A Trehub

Slaybaugh et al. explain that they have reanalyzed the data and have discovered that John Q. got a total of 80 hits while Willie Mays got only 50 and that they therefore question my conclusions. This may seem absurd, but the argument has no more validity in their comment than it does in this example. 2) There is exceptionally poor recall in this experiment. This is not the case. Recall is only ...

Journal: :IACR Cryptology ePrint Archive 2010
Chester Rebeiro Debdeep Mukhopadhyay

The paper presents a differential cache trace attack against CLEFIA, a 128 bit block cipher designed by Sony Corporation. The attack shows that such ciphers based on the generalized Feistel structures leak information of the secret key if the cache trace pattern is revealed to an adversary. The attack that we propose is a three staged attack and reveals the entire key with 2 CLEFIA encryptions....

Journal: :Proceedings of the ... Annual Hawaii International Conference on System Sciences 2021

Many power grid applications rely on the time synchronized measurement data collected by phasor units (PMUs) and or Merging Units (MUs)). The synchronization of from multiple PMUs MUs relies global positioning system (GPS) to provide reference. civilian GPS receivers used in PMU operate according publicly available mechanism. Therefore, attackers can easily generate false signals with low-cost ...

Journal: :IACR Cryptology ePrint Archive 2013
Subhadeep Banik Subhamoy Maitra

In this paper we present a differential fault attack on the stream cipher MICKEY 2.0 which is in eStream’s hardware portfolio. While fault attacks have already been reported against the other two eStream hardware candidates Trivium and Grain, no such analysis is known for MICKEY. Using the standard assumptions for fault attacks, we show that by injecting around 2 faults and performing 2 computa...

2008
Orr Dunkelman Nathan Keller

MISTY1 is a Feistel block cipher that received a great deal of cryptographic attention. Its recursive structure, as well as the added FL layers, have been successful in thwarting various cryptanalytic techniques. The best known attacks on reduced variants of the cipher are on either a 4-round variant with the FL functions, or a 6-round variant without the FL functions (out of the 8 rounds of th...

Journal: :IACR Cryptology ePrint Archive 2010
Shubo Liu Ming Tang Si Gao Huanguo Zhang

Differntial Power Attack (DPA) is one kind of Side Channel Attacks (SCAs). There are two phases in DPA attacks: sample collection and statistical analysis, which can be utilized to construct different countermeasures against DPAs, such as balancing technologies. We propose a novel methodology to implement a secure DPA resistant crypto processor and we name this as evolutionary cipher(EVOC). EVO...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید