Results 1  10
of
1,065,551
WeakKey Analysis of POET
"... Abstract. We evaluate the security of the recently proposed authenticated encryption scheme POET with regard to weak keys when its universal hash functions are instantiated with finite field multiplications. We give explicit constructions for weak key classes not covered by POET’s weak key testing s ..."
Abstract
 Add to MetaCart
Abstract. We evaluate the security of the recently proposed authenticated encryption scheme POET with regard to weak keys when its universal hash functions are instantiated with finite field multiplications. We give explicit constructions for weak key classes not covered by POET’s weak key testing
Weak Keys for IDEA
 Advances in Cryptology, CRYPTO 93 Proceedings
, 1993
"... . Large classes of weak keys have been found for the block cipher algorithm IDEA, previously known as IPES [?]. IDEA has a 128bit key and encrypts blocks of 64 bits. For a class of 2 23 keys IDEA exhibits a linear factor. For a certain class of 2 35 keys the cipher has a global characteristic wi ..."
Abstract

Cited by 37 (3 self)
 Add to MetaCart
. Large classes of weak keys have been found for the block cipher algorithm IDEA, previously known as IPES [?]. IDEA has a 128bit key and encrypts blocks of 64 bits. For a class of 2 23 keys IDEA exhibits a linear factor. For a certain class of 2 35 keys the cipher has a global characteristic
Searching for Weak Keys
, 2000
"... Alphanumeric passwords, also called keys, are being used for many security related applications. A random key could be quite secure but is dicult to remember. A typical solution that is followed is to use an easytoremember seed to generate a random key using a Pseudo Random Generator. Keys generat ..."
Abstract
 Add to MetaCart
generated using simple seeds are termed as weak keys for this work. In this work a key breaker for weak keys has been developed, which generates keys using Pseudo Random Generators provided with simple seeds. The key breaker can be used for any cryptographic algorithm as key generation process
GCM, GHASH and Weak Keys
"... Abstract. The Galois/Counter Mode (GCM) of operation has been standardized by NIST to provide singlepass authenticated encryption. The GHASH authentication component of GCM belongs to a class of WegmanCarter polynomial universal hashes that operate in the field GF (2128). GCM uses the same block ..."
Abstract
 Add to MetaCart
cipher key K to both encrypt data and to derive the generator H of the authentication polynomial. In present literature, only the trivial weak key H = 0 has been considered. In this note we show that GHASH has much wider classes of weak keys, analyze some of their properties, and give experimental
Weak Keys of CRYPTON
"... The block cipher CRYPTON is a candidate proposal for the AES standard. In this report we describe a class of 2 32 weak keys. This is mainly a consequence of the use of linear operations in the key schedule. These weak keys especially have consequences for the use of CRYPTON in certain hash functio ..."
Abstract
 Add to MetaCart
The block cipher CRYPTON is a candidate proposal for the AES standard. In this report we describe a class of 2 32 weak keys. This is mainly a consequence of the use of linear operations in the key schedule. These weak keys especially have consequences for the use of CRYPTON in certain hash
New WeakKey Classes of IDEA
 ICICS 2002. LNCS
, 2002
"... This paper presents a large collection of new weakkey classes for the IDEA cipher . The classes presented in this paper contain 2 2 weak keys (as compared with 2 differential weak keys presented by Daemen at CRYPTO'93 and 2 differentiallinear weakkeys presented by Hawkes at EUROCRYPT'9 ..."
Abstract

Cited by 9 (0 self)
 Add to MetaCart
This paper presents a large collection of new weakkey classes for the IDEA cipher . The classes presented in this paper contain 2 2 weak keys (as compared with 2 differential weak keys presented by Daemen at CRYPTO'93 and 2 differentiallinear weakkeys presented by Hawkes at EUROCRYPT
On the Weak Keys of Blowfish
, 1995
"... Blowfish is a sixteenrounds Feistel cipher in which the F function is a part of the private key. In this paper, we show that the disclosure of F allows to perform a differential cryptanalysis which can recover all the rest of the key with 2 48 chosen plaintexts against a number of rounds redu ..."
Abstract
 Add to MetaCart
Blowfish is a sixteenrounds Feistel cipher in which the F function is a part of the private key. In this paper, we show that the disclosure of F allows to perform a differential cryptanalysis which can recover all the rest of the key with 2 48 chosen plaintexts against a number of rounds
Weak Keys in MST1
, 2002
"... The public key cryptosystem MST1 has been introduced in [9]. Its security relies on the hardness of factoring with respect to wild logarithmic signatures. To identify `wildlike' logarithmic signatures, the criterion of being totallynontransversal has been proposed. ..."
Abstract
 Add to MetaCart
The public key cryptosystem MST1 has been introduced in [9]. Its security relies on the hardness of factoring with respect to wild logarithmic signatures. To identify `wildlike' logarithmic signatures, the criterion of being totallynontransversal has been proposed.
Linearly Weak Keys of RC5
 IEE Electronics Letters
, 1997
"... : In this Letter, we examine the application of linear cryptanalysis to the RC5 privatekey cipher and show that there are expected to be weak keys for which the attack is applicable to many rounds. It is demonstrated that, for the 12round nominal RC5 version with a 64bit block size and a 128bit ..."
Abstract

Cited by 9 (2 self)
 Add to MetaCart
: In this Letter, we examine the application of linear cryptanalysis to the RC5 privatekey cipher and show that there are expected to be weak keys for which the attack is applicable to many rounds. It is demonstrated that, for the 12round nominal RC5 version with a 64bit block size and a 128bit
WeakKey Leakage Resilient Cryptography
"... In traditional cryptography, the standard way of examining the security of a scheme is to analyze it in a blackbox manner, capturing no side channel attacks which exploit various forms of unintended information leakages and do threaten the practical security of the scheme. One way to protect agains ..."
Abstract
 Add to MetaCart
of keyleakage attacks to cover them. However, most keyleakage attacks in reality tend to be weak keyleakage attacks which can be viewed as a nonadaptive version of the keyleakage attacks. Powerful as those may be, the existing constructions of cryptographic schemes in adaptive keyleakage attacks
Results 1  10
of
1,065,551