The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Impossible differential cryptanalysis is an analysis method by constructing impossible differential path, eliminating the keys satisfying this path, and finally recovering the secret keys. This paper has utilized a new property of Mix Columns Transformation, constructed a new 4-round impossible differential path, added 1-round and 3-round possible differential path before and behind this path respectively,...
RSA is a typical algorithm of public key cryptography algorithm, analyzing the reason of large prime numbers which is the factor of restricting thisalgorithm's safety, and giving the method of determining the large prime numbers. Design fitness function, crossover and mutation strategies which can be used in genetic algorithm. Finally design the algorithm of producing large prime numbers.
After the analysis of the working principle of WAPI, its security weaknesses are pointed out: it does not securely realize the goal of identity authentication and key agreement. According to the security weaknesses, the key agreement part is improved without changing the framework of WAPI. The improved protocol is not only SK-secure but also UC-secure, thus realizing identity authentication and key...
This paper utilized the arrangement points of AES_256 key, analyzed the difference features of AES_256, and found a method of collision attack. This paper also made use of connection differential features and collision method of AES_256 to analyze the 72 bytes of the initial key of AES_256, with a complexity of 2.
SMS4 algorithm packet length and key length is 128 bit. This article presents a SMS4 algorithm of byte-oriented theory, algebraic fault attack only need 1 error redaction that we can recover SMS4 of 128 bit key.
Serpent is an SP network block cipher submitted to the AES competition and chosen as one of its five finalists. The security of serpent is widely acknowledged, especially as the best known attack so far is a differential-linear attack on only 11 rounds out of the 32 rounds of the cipher. This paper proposed impossible differential-algebraic cryptanalysis of 11-round Serpent using the key arrangement...
In this paper, we proposed an Binary Image Watermarking Algorithm Based on SVD and used AES algorithm with KEY, because this type of watermark has stronger impact during the copyright reclamation moment, compared with the use of a pseudo random pattern generated by a secret key as watermark code. The proposed algorithm is evaluated from the transparency point of view and the robustness against some...
Aiming at the binary text image's characteristics of simple pixel, complex texture, and bad immunity of information concealment, a digital watermarking embedment location choosing method based upon singular value decomposition has been put forward. This method divides binary text images into different DCT classes. Equivalent classes are further divided into different DCT subclasses according to each...
Aiming at the binary text imagepsilas characteristics of simple pixel, complex texture and bad immunity of information concealment, a digital watermarking embedment location choosing method based upon compatible roughness class has been put forward. This method divides binary text images into different equivalence classes. Equivalence classes are further divided into different subclasses according...
The high score pigtail rate satellite remote sensing image may provide the rich data for the urban quakeproof disaster reduction information system's construction. But, because its slight information is specially rich, has brought certain difficulty for the related terrain feature object detection and the extraction. The image division's goal lies in the original image divides some in the space neighboring,...
A new scrambling method of true color images based on AES algorithm is proposed. It takes the structure of true color images into full consideration, and decreases the complexity. The analytical method of cryptography is first used in this paper to analyze the security of disordered images; at the same time, an error-correcting code is designed to prevent passive attacks based on bit modification...
Serpent is a block cipher which was suggested as a candidate for the advanced encryption standard (AES). Several recently proposed ciphers are built with layers of small S-boxes, interconnected by linear key-dependent layers. In this paper we study the security of such ciphers under an additional hypothesis: the S-box can be described by an over defined system of algebraic equations. We study general...
With packing problem thinking, this paper proposes a non-symmetry and anti-packing pattern representation model which is short for NAM color image representation method. It presents a new color image representation algorithm based on NAM through decrypting NAM and the method of binary-bit plane decomposition (BPD) of color images. Aiming at the binary text image??s characteristics of simple pixel,...
With packing problem thinking, this paper proposes a non-symmetry and anti-packing pattern representation model which is short for NAM color image representation method. It presents a new color image representation algorithm based on NAM through decrypting NAM and the method of binary-bit plane decomposition (BPD) of color images. Experimental indicates that the method is the color image mode represents...
This paper proposes a digital watermarking method based on valve-value surface. First it builds the valve value of curve surface of the original image to get the outline information of the original image; then it embeds watermarks into the edge of the outline. Because the function used by the method to build valve-value surface has high gliding property and easy interpolation ability, the method has...
This paper proposes a color image digital watermarking method based on valve-value surface. First it builds the valve value of curve surface of the original image to get the outline information of the original image; then it embeds watermarks into the edge of the outline. Because the function used by the method to build valve-value surface has high gliding property and easy interpolation ability,...
An experiment facility for observing low-temperature molten tin alloy droplet into water was established to investigate mechanisms of vapor explosion occurring in severe accidents of a fission nuclear reactor. The vapor explosion behaviors of the molten material were observed by a high-speed video camera and the vapor explosion pressures were recorded by a pressure transducer mounted under the water...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.