搜索结果: 1-15 共查到“军事学 DES”相关记录28条 . 查询时间(0.13 秒)
Cryptanalysis of the Full DES and the Full 3DES Using a New Linear Property
linear cryptanalysis DES 3DES
2019/1/2
In this paper we extend the work presented by Ashur and Posteuca in BalkanCryptSec 2018, by designing 0-correlation key-dependent linear trails covering more than one round of DES. First, we design a ...
Improved Brute-Force Search Strategies for Single-Trace and Few-Traces Template Attacks on the DES Round Keys
DES TDES Template Attack
2018/11/7
We present an improved search strategy for a template attack on the secret DES key of a widely-used smart card, which is based on a Common-Criteria certified chip. We use the logarithm of the probabil...
At Indocrypt 2016, Ashur et al. showed that linear hulls are sometimes formed in a single round of a cipher (exemplifying on Simon ciphers) and showed that the success rate of an attack may be influen...
A first-order chosen-plaintext DPA attack on the third round of DES
side-channel attack DPA countermeasure
2018/1/2
DPA attacks usually exhibit a "divide-and-conquer" property: the adversary needs to enumerate only a small space of the key (a key sub-space) when performing the DPA attack. This is achieved trivially...
Linear cryptanalysis of DES, proposed by Matsui in 1993, has had a seminal impact on symmetric-key cryptography, having seen massive research efforts over the past two decades. It has spawned many var...
Brute–Force Search Strategies for Single–Trace and Few–Traces Template Attacks on the DES Round Keys of a Recent Smart Card
DES side-channel attack DES key schedule
2017/6/28
Recently, a new template attack on the DES key scheduling was demonstrated that allows recovery of a sufficiently large portion of the DES key of a widely deployed certified smart card chip using a si...
Faster Secure Multi-Party Computation of AES and DES Using Lookup Tables
multi-party computation block cipher implementation
2017/5/2
We present an actively secure protocol for secure multi-party computation based on lookup tables, by extending the recent, two-party `TinyTable' protocol of Damgard et al. (ePrint 2016). Like TinyTabl...
Single--Trace Template Attack on the DES Round Keys of a Recent Smart Card
DES TDES Template Attack
2017/2/20
A new template attack on the DES key scheduling is demonstrated that allows recovery of a sufficiently large portion of the DES key of a recent and widely deployed smart card chip with a {\it single} ...
On a Linear Cryptanalysis of a Family of Modified DES Ciphers with Even Weight S-boxes
parity check linear cryptanalysis linear characteristics
2017/2/20
We investigate the effect of inserting extra linearity in the Data Encryption Standard (DES) through appropriate singular linear encodings of the output of the individual S-boxes. More specifically, w...
New Results in the Linear Cryptanalysis of DES
linear cryptanalysis multiple linear approximations success probability
2016/1/9
Two open problems on using Matsui’s Algorithm 2 with multiple linear approximations
posed earlier by Biryukov, De Canni`ere and M. Quisquater at Crypto’04 are
solved in the present paper. That impro...
Statistical and Algebraic Properties of DES
output distributions linear dependencies coset representation
2015/12/24
D. Davies and S. Murphy found that there are at most 660 different probability
distributions on the output from any three adjacent S-boxes after 16 rounds of DES [3]. In
this paper it is shown that ...
Static Fault Attacks on Hardware DES Registers
Hardware DES fault attacks safe-error register attacks
2012/3/26
In the late nineties, Eli Biham and Adi Shamir published the first paper on Differential Fault Analysis on symmetric key algorithms. More specifically they introduced a fault model where a key bit loc...
Logical cryptoanalysis on the example of the cryptosystem DES
block ciphers DES Boolean functions
2010/2/20
In the paper on the example of the cryptosystem DES, the successful
method of a cryptanalysis is presented. As a result, it is offered as
a criterion of the cryptographic security to use a complexit...
数字电视CAS中DES加密模块的FPGA实现
DES 流水线 循环法
2009/8/4
一种基于FPGA的数据加密标准算法的实现。就资源优先和性能优先分别使用循环法和流水线法对DES加密算法进行了设计,并对其进行了比较。通过采用子密钥简单产生和ROM优化S盒的方法,对流水线法进行改进,达到了资源占用率低、加密速度快的效果。
How to Launch A Birthday Attack Against DES
DES Differential cryptanalysis Linear cryptanalysis
2009/6/5
We present a birthday attack against DES. It is entirely based on the relationship
Li+1 = Ri and the simple key schedule in DES. It requires about 216 ciphertexts of the same
R16, encrypted by the s...