218 research outputs found
A reversible system based on hybrid toggle radius-4 cellular automata and its application as a block cipher
The dynamical system described herein uses a hybrid cellular automata (CA)
mechanism to attain reversibility, and this approach is adapted to create a
novel block cipher algorithm called HCA. CA are widely used for modeling
complex systems and employ an inherently parallel model. Therefore,
applications derived from CA have a tendency to fit very well in the current
computational paradigm where scalability and multi-threading potential are
quite desirable characteristics. HCA model has recently received a patent by
the Brazilian agency INPI. Several evaluations and analyses performed on the
model are presented here, such as theoretical discussions related to its
reversibility and an analysis based on graph theory, which reduces HCA security
to the well-known Hamiltonian cycle problem that belongs to the NP-complete
class. Finally, the cryptographic robustness of HCA is empirically evaluated
through several tests, including avalanche property compliance and the NIST
randomness suite.Comment: 34 pages, 12 figure
Data Encryption and Decryption Using Hill Cipher Method and Self Repetitive Matrix
Since times immemorial, security of data to maintain its confidentiality, proper access control, integrity and availability has been a major issue in data communication. As soon as a sensitive message was etched on a clay tablet or written on the royal walls, then it must have been foremost in the sender’s mind that the information should not get intercepted and read by a rival. Codes, hence, form an important part of our history, starting from the paintings of Da Vinci and Michelangelo to the ancient Roman steganographic practices the necessity of data hiding was obvious
Recommended from our members
Cryptoraptor : high throughput reconfigurable cryptographic processor for symmetric key encryption and cryptographic hash functions
textIn cryptographic processor design, the selection of functional primitives and connection structures between these primitives are extremely crucial to maximize throughput and flexibility. Hence, detailed analysis on the specifications and requirements of existing crypto-systems plays a crucial role in cryptographic processor design. This thesis provides the most comprehensive literature review that we are aware of on the widest range of existing cryptographic algorithms, their specifications, requirements, and hardware structures. In the light of this analysis, it also describes a high performance, low power, and highly flexible cryptographic processor, Cryptoraptor, that is designed to support both today's and tomorrow's encryption standards. To the best of our knowledge, the proposed cryptographic processor supports the widest range of cryptographic algorithms compared to other solutions in the literature and is the only crypto-specific processor targeting the future standards as well. Unlike previous work, we aim for maximum throughput for all known encryption standards, and to support future standards as well. Our 1GHz design achieves a peak throughput of 128Gbps for AES-128 which is competitive with ASIC designs and has 25X and 160X higher throughput per area than CPU and GPU solutions, respectively.Electrical and Computer Engineerin
Differential-Linear Cryptanalysis of ICEPOLE
ICEPOLE is a CAESAR candidate with the intermediate level of robustness under nonce misuse circumstances in the original document. In particular, it was claimed that key recovery attack against ICEPOLE is impossible in the case of nonce misuse. ICEPOLE is strong against the differential cryptanalysis and linear cryptanalysis. In this paper, we developed the differential-linear attacks against ICEPOLE when nonce is misused. Our attacks show that the state of ICEPOLE-128 and ICEPOLE-128a can be recovered with data complexity and time complexity ; the state of ICEPOLE-256a can be recovered with data complexity and time complexity . For ICEPOLE-128a and ICEPOLE-256a, the secret key is recovered once the state is recovered. We experimentally verified the attacks against ICEPOLE-128 and ICEPOLE-128a
Quantum cryptography: key distribution and beyond
Uniquely among the sciences, quantum cryptography has driven both
foundational research as well as practical real-life applications. We review
the progress of quantum cryptography in the last decade, covering quantum key
distribution and other applications.Comment: It's a review on quantum cryptography and it is not restricted to QK
- …