搜索结果: 1-15 共查到“知识库 军事学 substitution”相关记录16条 . 查询时间(0.093 秒)
Substitution Attacks against Message Authentication
Algorithm Substitution Attacks Authentication Mass Surveillance
2019/9/3
This work introduces Algorithm Substitution Attacks (ASAs) on message authentication schemes. In light of revelations concerning mass surveillance, ASAs were initially introduced by Bellare, Paterson ...
A Modified Simple Substitution Cipher With Unbounded Unicity Distance
finite-key unicity randomization
2019/6/4
The classic simple substitution cipher is modified by randomly inserting key-defined noise characters into the ciphertext in encryption which are ignored in decryption. Interestingly, this yields a fi...
Recently, the NIST launched a competition for lightweight cryptography and a large number of ciphers are expected to be studied and analyzed under this competition. Apart from the classical security, ...
Constructing TI-friendly Substitution Boxes using Shift-Invariant Permutations
Shift-invariant Threshold implementation Sbox
2018/11/7
The threat posed by side channels requires ciphers that can be efficiently protected in both software and hardware against such attacks. In this paper, we proposed a novel Sbox construction based on i...
Wide Tweakable Block Ciphers Based on Substitution-Permutation Networks: Security Beyond the Birthday Bound
substitution-permutation networks tweakable block ciphers domain extension of block ciphers
2018/5/28
Substitution-Permutation Networks (SPNs) refer to a family of constructions which build a wnwn-bit (tweakable) block cipher from nn-bit public permutations. Many widely deployed block ciphers are part...
Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks
public-key private-key
2017/10/10
We put forward the notion of self-guarding cryptographic protocols as a countermeasure to algorithm substitution attacks. Such self-guarding protocols can prevent undesirable leakage by subverted algo...
Many modern block ciphers are constructed based on the paradigm of substitution-permutation networks (SPNs). But, somewhat surprisingly---especially in comparison with Feistel networks, which have bee...
Automatic Search for a Maximum Probability Differential Characteristic in a Substitution-Permutation Network
Block ciphers Cryptanalysis
2016/6/27
The algorithm presented in this paper computes a maximum probability differential characteristic in a Substitution-Permutation Network (or SPN). Such characteristics can be used to prove that a cipher...
Relating Undisturbed Bits to Other Properties of Substitution Boxes
block cipher substitution box undisturbed bits
2016/1/6
Recently it was observed that for a particular nonzero input
difference to an S-Box, some bits in all the corresponding output
differences may remain invariant. These specific invariant bits are cal...
An Authentication Code over Galois Rings with Optimal Impersonation and Substitution Probabilities
Authentication codes optimality against impersonation substitution attacks
2015/12/29
A new systematic authentication scheme based on the Gray map
over Galois rings is introduced. The Gray map determines an isometry between
the Galois ring and a vector space over a Galois field. The ...
Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks
algorithm substitution attacks kleptography symmetric encryption
2015/12/24
We present new algorithm-substitution attacks (ASAs) on symmetric encryption that improve over prior ones in two ways. First, while prior attacks only broke a sub-class of randomized schemes having a ...
2-round Substitution-Permutation and 3-round Feistel Networks have bad Algebraic Degree
2-round Substitution-Permutation 3-round Feistel Networks Algebraic Degree
2010/2/20
We study algebraic degree profile of reduced-round block cipher schemes.
We show that the degree is not maximal with elementary combinatorial
and algebraic arguments. We discuss on how it can be tur...
Enhanced Cryptanalysis of Substitution Cipher Chaining mode (SCC-128)
Enhanced Cryptanalysis Substitution Cipher Chaining mode SCC-128
2009/6/12
In this paper, we present an enhanced cryptanalysis of the
Substitution Cipher Chaining mode (SCC) [1]. In [2], SCC-128 (SCC
which uses AES with 128-bit key) was broken using 5 attacks, where the
a...
Extended Substitution Cipher Chaining mode(ESCC)
Extended Substitution Cipher Chaining mode ESCC
2009/6/12
In this paper, we present a new tweakable narrow-block
mode of operation, the Extended Substitution Cipher Chaining
mode (ESCC), that can be efficiently deployed in disk
encryption applications. ES...
The Analysis of Galois Substitution Counter Mode(GSCM)
Galois Substitution Counter Mode GSCM GCM
2009/6/12
In [9], GSCM mode of operation for authenticated encryption
was presented. GSCM is based on the Galois/
Counter Mode (GCM). GSCM is an enhancement of
GCM, which is characterized by its high through...