The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper utilized the arrangement points of AES_256 key, analyzed the difference features of AES_256, and found a method of collision attack. This paper also made use of connection differential features and collision method of AES_256 to analyze the 72 bytes of the initial key of AES_256, with a complexity of 2.
The Substitution Box (S-Box for short) is the core component of a block cipher. The strength of a block cipher basically depends on the cryptography property of the S-Box it employs. Designers use "nonlinearity", "autocorrelation" and "difference" as the S-Box designing criteria. In this paper, we focus on optimizing S-Boxes by two heuristic methods - Genetic Algorithm...
Serpent is an SP network block cipher submitted to the AES competition and chosen as one of its five finalists. The security of serpent is widely acknowledged, especially as the best known attack so far is a differential-linear attack on only 11 rounds out of the 32 rounds of the cipher. This paper proposed impossible differential-algebraic cryptanalysis of 11-round Serpent using the key arrangement...
Serpent is a block cipher which was suggested as a candidate for the advanced encryption standard (AES). Several recently proposed ciphers are built with layers of small S-boxes, interconnected by linear key-dependent layers. In this paper we study the security of such ciphers under an additional hypothesis: the S-box can be described by an over defined system of algebraic equations. We study general...
During these years, computer security is in expeditious progressing. With the serious risk of security, the idea of Trusted Computing was introduced to the Information Technology industry. Trusted Computing has to ensure the computing is on the trusted platforms, so the technology of Trusted Computing Platform (TCP) was developed. In the specification of Trusted Computing Group (TCG), Trusted Platform...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.