Results 1 - 10
of
309
The RC5 Encryption Algorithm
, 1995
"... Abstract. This document describes the RC5 encryption algorithm. RC5 is a fast symmetric block cipher suitable for hardware or software implementations. A novel feature of RC5 is the heavy use of data-dependent rotations. RC5 has a variable word size, a variable number of rounds, and a variable-lengt ..."
Abstract
-
Cited by 363 (7 self)
- Add to MetaCart
-word (64-bit) input (plaintext) and output (ciphertext) block sizes. RC5 uses an \expanded key table, " S, derived from the user's supplied secret key. The size t of table S depends on the number r of rounds: S has t =2(r +1) words. There are thus several distinct \RC5 " algorithms
Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS1
, 1998
"... This paper introduces a new adaptive chosen ciphertext attack against certain protocols based on RSA. We show that an RSA private-key operation can be performed if the attacker has access to an oracle that, for any chosen ciphertext, returns only one bit telling whether the ciphertext corresponds to ..."
Abstract
-
Cited by 288 (1 self)
- Add to MetaCart
This paper introduces a new adaptive chosen ciphertext attack against certain protocols based on RSA. We show that an RSA private-key operation can be performed if the attacker has access to an oracle that, for any chosen ciphertext, returns only one bit telling whether the ciphertext corresponds
Turing Functional Ciphertext
"... Abstract Current research literature for protecting mobile agents from malicious execution environments, such as homomorphic encryption schemes, Boolean circuits, obfuscation and computing with encrypted functions, provide building blocks for the possibility of secure remote encrypted computations. ..."
Abstract
- Add to MetaCart
Abstract Current research literature for protecting mobile agents from malicious execution environments, such as homomorphic encryption schemes, Boolean circuits, obfuscation and computing with encrypted functions, provide building blocks for the possibility of secure remote encrypted computations
Survey on Block Cipher-Text Cryptography Algorithms
"... Cloud storage is an online data storage and it is located as centrally.Cloud data ownerprovidethe facility for users to online store their data and access from any location. Though it has reliable for the user to achieve a secure and dependent cloud storage service. Ina key aggregate crypto-systemke ..."
Abstract
- Add to MetaCart
Cloud storage is an online data storage and it is located as centrally.Cloud data ownerprovidethe facility for users to online store their data and access from any location. Though it has reliable for the user to achieve a secure and dependent cloud storage service. Ina key aggregate crypto-systemkey is generated fordifferent attributes of data in different cipher text classes and its associated keys. It derived aggregate key on the basis of attribute and identitywhich, depending on the different classes according to cloud data owner. By using this technique aunique cryptographic key achieves. It is optimallysecure for cloud data and privacy preserving key generating process.The cloud data ownerdecidesthe access levelof the data, such as public, private and hierarchyaccess level in order toenhance the data access capability in a data sharing cloud mechanism.Blowfish is thebest data security algorithm. It is higher security and faster execution as compared toother cryptographic algorithms. The blowfish algorithmis a secure for storing data in the cloud.It is an effective derivation of secret key generation and key management.
A Proposal for a New Block Encryption Standard
, 1991
"... A new secret-key block cipher is proposed as a candidate for a new encryption standard. In the proposed cipher, the plaintext and the ciphertext are 64 bit blocks, while the secret key is 128 bit long. The cipher is based on the design concept of "mixing operations from different algebraic grou ..."
Abstract
-
Cited by 189 (3 self)
- Add to MetaCart
A new secret-key block cipher is proposed as a candidate for a new encryption standard. In the proposed cipher, the plaintext and the ciphertext are 64 bit blocks, while the secret key is 128 bit long. The cipher is based on the design concept of "mixing operations from different algebraic
Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation
- In FSE ’00
, 1978
"... Abstract. We find certain neglected issues in the study of private-key encryption schemes. For one, private-key encryption is generally held to the same standard of security as public-key encryption (i.e., indistinguishability) even though usage of the two is very different. Secondly, though the imp ..."
Abstract
-
Cited by 45 (3 self)
- Add to MetaCart
of the above definition. This gives the first mode provably secure against chosen ciphertext attacks. Although RPC is slightly less efficient than, say, CBC mode (requiring about 33 % more block cipher applications and having ciphertext expansion of the same amount when using a block cipher with 128-bit
OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption
, 2001
"... We describe a parallelizable block-cipher mode of operation that simultaneously provides privacy and authenticity. OCB encrypts-and-authenticates a nonempty string M # {0, 1} # using #|M |/n# + 2 block-cipher invocations, where n is the block length of the underlying block cipher. Additional ov ..."
Abstract
-
Cited by 204 (24 self)
- Add to MetaCart
We describe a parallelizable block-cipher mode of operation that simultaneously provides privacy and authenticity. OCB encrypts-and-authenticates a nonempty string M # {0, 1} # using #|M |/n# + 2 block-cipher invocations, where n is the block length of the underlying block cipher. Additional
Testing Randomness in Ciphertext of Block-Ciphers Using DieHard Tests
"... One of the important aspects of the security of block ciphers is the randomness of the cipher text. One criterion used to evaluate the Advanced Encryption Standard (AES) candidate algorithms was their demonstrated suitability as random number generators. In this paper, we introduced a new approach t ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
One of the important aspects of the security of block ciphers is the randomness of the cipher text. One criterion used to evaluate the Advanced Encryption Standard (AES) candidate algorithms was their demonstrated suitability as random number generators. In this paper, we introduced a new approach
A generalisation, a simplification and some applications of Paillier's probabilistic public-key system
- LNCS
, 2001
"... We propose a generalisation of Paillier’s probabilistic public key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme even after the public key has been fixed, without loosing the homomorphic property.We show that the generalisation is as secu ..."
Abstract
-
Cited by 222 (2 self)
- Add to MetaCart
We propose a generalisation of Paillier’s probabilistic public key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme even after the public key has been fixed, without loosing the homomorphic property.We show that the generalisation
From Differential Cryptanalysis to Ciphertext-Only Attacks
- Lecture Notes in Computer Science 1462, Advances in Cryptology -- Proceedings of CRYPTO'98, pp.72--88
, 1998
"... Abstract. We present a method for efficient conversion of differential (chosen plaintext) attacks into the more practical known plaintext and ciphertext-only attacks. Our observation may save up to a factor of 2 20 in data over the known methods, assuming that plaintext is ASCII encoded English (or ..."
Abstract
-
Cited by 5 (1 self)
- Add to MetaCart
Abstract. We present a method for efficient conversion of differential (chosen plaintext) attacks into the more practical known plaintext and ciphertext-only attacks. Our observation may save up to a factor of 2 20 in data over the known methods, assuming that plaintext is ASCII encoded English (or
Results 1 - 10
of
309