Potestad-Ordóñez, Francisco Eugenio Valencia-Barrero, Manuel Baena-Oliva, Carmen Parra-Fernández, Pilar Jiménez-Fernández, Carlos Jesús
Published in
Sensors (Basel, Switzerland)
One of the best methods to improve the security of cryptographic systems used to exchange sensitive information is to attack them to find their vulnerabilities and to strengthen them in subsequent designs. Trivium stream cipher is one of the lightweight ciphers designed for security applications in the Internet of things (IoT). In this paper, we pr...
Gu, Xiaolin Wu, Wenjia Gu, Xiaodan Ling, Zhen Yang, Ming Song, Aibo
Published in
Sensors (Basel, Switzerland)
Wi-Fi network has an open nature so that it needs to face greater security risks compared to wired network. The MAC address represents the unique identifier of the device, and is easily obtained by an attacker. Therefore MAC address randomization is proposed to protect the privacy of devices in a Wi-Fi network. However, implicit identifiers are use...
antonov, nikolai
Vytvoření algoritmických generátorů náhodných čísel je důležitým tématem v oblasti matematického modelování, aplikované matematiky a moderní kryptografie. Navzdory skutečnosti, že k řešení tohoto problému bylo navrženo mnoho konceptů a konečných řešení, jsou známé algoritmické generátory charakterizovány kompromisem mezi jejich statistickými vlastn...
Yu, Mingji Liu, Yuchen Sun, Hu Yao, Heng Qiao, Tong
Published in
EURASIP Journal on Image and Video Processing
To ensure the security of digital information, information needs to be stored and processed in the encryption domain during the cloud storage process, during which the user does not allow the cloud provider (CP) to access the image contents, and the CP must embed additional information in the image. Therefore, reversible data hiding in an encryptio...
Jiao, Lin Hao, Yonglin Feng, Dengguo
Published in
Science China Information Sciences
Stream cipher is an important branch of symmetric cryptosystems, which takes obvious advantages in speed and scale of hardware implementation. It is suitable for using in the cases of massive data transfer or resource constraints, and has always been a hot and central research topic in cryptography. With the rapid development of network and communi...
Hao, Yonglin Leander, Gregor Meier, Willi Todo, Yosuke Wang, Qingju
chen, xiaolin liu, huaning
Recently Edemskiy proposed a method for computing the linear complexity of generalized cyclotomic binary sequences of period p n + 1 , where p = d R + 1 is an odd prime, d , R are two non-negative integers, and n > / 0 is a positive integer. In this paper we determine the exact values of autocorrelation of these sequences of period p n + 1 ( n &g...
david, vojtěch
Ve své práci se zabývám bezpečnostní analýzou ruční šifry Solitaire od kryptologa Bruce Schneiera. V textu je detailně popsán její princip a vysvětleno, jak šifru bezpečně používat. Dále zkoumám možné slabiny šifry, konkrétně jsem se zaměřil na nenáhodnost ve výstupu, znovupoužití stejného klíče a náhodnost pouzic jokerů v balíčku. Ukazuji, jaký je...
garcia-bosque, miguel díez-señorans, guillermo pérez-resa, adrián sánchez-azqueta, carlos aldea, concepción celma, santiago
In this work, a novel chaos-based stream cipher based on a skew tent map is proposed and implemented in a 0.18 &mu / m CMOS (Complementary Metal-Oxide-Semiconductor) technology. The proposed ciphering algorithm uses a linear feedback shift register that perturbs the orbits generated by the skew tent map after each iteration. This way, the randomnes...
Wang, Qingju Hao, Honglin Todo, Yosuke Li, Chaoyun Takanori, Isobe Meier, Willi
At CRYPTO 2017 and IEEE Transactions on Computers in 2018, Todo et al. proposed the division property based cube attack method making it possible to launch cube attacks with cubes of dimensions far beyond practical reach. However, assumptions are made to validate their attacks. In this paper, we further formulate the algebraic properties of the sup...