Search results for "Symmetric-key algorithm"

showing 3 items of 3 documents

A Note on Keys and Keystreams of Chacha20 for Multi-key Channels

2018

In this paper we analyze the keystreams generated by the Chacha20 stream cipher. We also compare these to the ones generated by its predecessor, the RC4 stream cipher. Due to the proposed multi-key channels in the upcoming TLS 1.3 standard we analyze the behavior of the keystream in the boundary case where there is a single bit difference between two keys used for the initiation of the stream cipher algorithms. The goal is to check whether a single bit change in the key has any predictable influence on the bits of the keystream output.

Cybersecuritybusiness.industryComputer scienceKeystreamBoundary (topology)Stream cipher020206 networking & telecommunications02 engineering and technologyRC4Symmetric-key algorithmChacha200202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingHardware_ARITHMETICANDLOGICSTRUCTURESbusinessSymmetric encryptionStream cipherAlgorithm
researchProduct

On the Cryptanalysis of Two Cryptographic Algorithms That Utilize Chaotic Neural Networks

2015

This paper deals with the security and efficiency issues of two cipher algorithms which utilize the principles of Chaotic Neural Networks (CNNs). The two algorithms that we consider are (1) the CNN-Hash, which is a one-way hash function based on the Piece-Wise Linear Chaotic Map (PWLCM) and the One-Way Coupled Map Lattice (OCML), and (2) the Delayed CNN-Based Encryption (DCBE), which is an encryption algorithm based on the delayed CNN. Although both of these cipher algorithms have their own salient characteristics, our analysis shows that, unfortunately, the CNN-Hash is not secure because it is neither Second-Preimage resistant nor collision resistant. Indeed, one can find a collision with …

Theoretical computer scienceArticle SubjectComputer sciencebusiness.industryGeneral Mathematicslcsh:MathematicsHash functionGeneral EngineeringPlaintextCryptographyEncryptionlcsh:QA1-939law.inventionCipherMalleabilitySymmetric-key algorithmlawlcsh:TA1-2040Known-plaintext attackCiphertextCryptanalysisbusinesslcsh:Engineering (General). Civil engineering (General)AlgorithmMathematical Problems in Engineering
researchProduct

Secure Group Communication Using Fractional Public Keys

2010

Published version of a paper presented at the ARES '10 International Conference on Availability, Reliability, and Security (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher:http://dx.doi.org/10.1109/ARES.2010.13 In this paper, we present the novel concept of fractional public keys and an efficient zero-round multi-party Diffie-Hellman key agreement sc…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424TheoryofComputation_MISCELLANEOUSScheme (programming language)business.industryComputer scienceKey spaceTheoryofComputation_GENERALCryptographyPublic-key cryptographySymmetric-key algorithmCommunication in small groupsCollusionbusinessKey managementcomputerComputer networkcomputer.programming_language2010 International Conference on Availability, Reliability and Security
researchProduct