Articles with "cryptanalysis" as a keyword



A Novel Whale Optimization Algorithm for Cryptanalysis in Merkle-Hellman Cryptosystem

Sign Up to like & get
recommendations!
Published in 2018 at "Mobile Networks and Applications"

DOI: 10.1007/s11036-018-1005-3

Abstract: With the advance of the communication technology and the massive flow of information across the internet, it is becoming urgent to keep the confidentiality of the transmitted information. Using the internet has been extended to… read more here.

Keywords: merkle hellman; optimization; cryptanalysis; optimization algorithm ... See more keywords
Photo from wikipedia

A Further Understanding of Differential‐Linear Cryptanalysis

Sign Up to like & get
recommendations!
Published in 2020 at "Chinese Journal of Electronics"

DOI: 10.1049/cje.2020.05.010

Abstract: Differential-linear cryptanalysis has attracted much attention since proposed to attack DES in 1994, and then some generalized theories are developed to complement and unify the method. However, the links between differential-linear cryptanalysis and other important… read more here.

Keywords: linear cryptanalysis; linear hull; understanding differential; cryptanalysis ... See more keywords

Generalized Meet in the Middle Cryptanalysis of Block Ciphers With an Automated Search Algorithm

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2019.2962101

Abstract: Meet in the middle (MITM) attack is one of the most important and applicable methods for cryptanalysis of block ciphers. In this paper, a more generalized method for MITM attack is considered. For this purpose,… read more here.

Keywords: block ciphers; cryptanalysis; search algorithm;

Multilayer Dynamic Encryption for Security OFDM-PON Using DNA-Reconstructed Chaotic Sequences Under Cryptanalysis

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3054380

Abstract: In this paper, a multilayer dynamic encryption scheme using deoxyribonucleic acid reconstructed chaotic sequences (DNA-RCS) under cryptanalysis is firstly proposed, which aims at enhancing the security of orthogonal frequency division multiplexing passive optical network (OFDM-PON).… read more here.

Keywords: multilayer dynamic; chaotic sequences; security; permutation ... See more keywords

Integral Cryptanalysis of Lightweight Block Cipher PIPO

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3214665

Abstract: PIPO is a lightweight block cipher proposed at ICISC 2020, which has a byte-oriented structure suitable for bit-sliced implementation and allows for efficient higher-order masking implementations. In this study, we use bit-based division property techniques… read more here.

Keywords: cryptanalysis; lightweight block; block cipher; pipo ... See more keywords

Lightweight Cryptanalysis of IoT Encryption Algorithms: Is Quota Sampling the Answer?

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Access"

DOI: 10.1109/access.2024.3472014

Abstract: Rapid growth in the number of small sensor devices known as the Internet of Things (IoT) has seen the development of lightweight encryption algorithms. Two well-known lightweight algorithms are SIMON and SIMECK which have been… read more here.

Keywords: time; cryptanalysis; encryption algorithms; quota sampling ... See more keywords

Security Evaluation of Lightweight Block Ciphers Against Mixture Differential Cryptanalysis

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2024.3380254

Abstract: The proliferation of the Internet of Things (IoT) has amplified the necessity for secure data transmission. Lightweight block ciphers are pivotal in fortifying the security of IoT systems, yet the resource-constrained nature of IoT often… read more here.

Keywords: lightweight block; cryptanalysis; block; security ... See more keywords

Optical Cryptanalysis Method Using Wavefront Shaping

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Photonics Journal"

DOI: 10.1109/jphot.2017.2661809

Abstract: Optical techniques for information security have drawn a lot of attention in recent years. The development of cryptanalysis strategies will also have a positive promotion for the cryptosystems themselves. However, most of the present publications… read more here.

Keywords: method using; optical cryptanalysis; cryptanalysis method; cryptanalysis ... See more keywords

Differential cryptanalysis of full-round ANU-II ultra-lightweight block cipher

Sign Up to like & get
recommendations!
Published in 2022 at "International Journal of Distributed Sensor Networks"

DOI: 10.1177/15501329221119398

Abstract: Lightweight ciphers are often used as the underlying encryption algorithm in resource-constrained devices. Their cryptographic security is a mandatory goal for ensuring the security of data transmission. Differential cryptanalysis is one of the most fundamental… read more here.

Keywords: differential cryptanalysis; anu; block; cryptanalysis ... See more keywords

MILP Based Differential Cryptanalysis on IVLBC and Eslice 64

Sign Up to like & get
recommendations!
Published in 2024 at "Defence Science Journal"

DOI: 10.14429/dsj.74.19601

Abstract: Lightweight block ciphers provide security to resource-limited devices. However, many of these ciphers lack security analysis against basic attacks. This paper provides a detailed security analysis of two lightweight block ciphers, IVLBC and Eslice-64, against… read more here.

Keywords: eslice; attack; cryptanalysis; ivlbc eslice ... See more keywords

New collision paths for round-reduced SKINNY-Hash

Sign Up to like & get
recommendations!
Published in 2020 at "China Communications"

DOI: 10.23919/jcc.2020.06.012

Abstract: In recent years, with the rapid development of the Internet of Things (IoT), RFID tags, industrial controllers, sensor nodes, smart cards and other small computing devices are increasingly widely deployed. In order to help protect… read more here.

Keywords: hash; skinny hash; new collision; cryptanalysis ... See more keywords