A block cipher is one of the most common forms of algorithms used for data encryption. This paper describes an efficient set of statistical methods for analysing the security of these algorithms under the black-box ap...
详细信息
A block cipher is one of the most common forms of algorithms used for data encryption. This paper describes an efficient set of statistical methods for analysing the security of these algorithms under the black-box approach. The procedures can be fully automated, which provides the designer or user of a block cipher with a useful set of tools for security analysis.
Designers and users of encryption algorithms used in cipher systems need a systematic approach in examining their ciphers prior to use, to ensure that they are safe from crypt-analytic attack. This paper describes a c...
详细信息
Designers and users of encryption algorithms used in cipher systems need a systematic approach in examining their ciphers prior to use, to ensure that they are safe from crypt-analytic attack. This paper describes a computer package used for assessing the security of newly-developed encryption algorithms.
Communications security is increasing in importance as a result of the use of electronic communications in more and more business activities. Cryptography is the only practical means to provide security services in ma...
详细信息
Communications security is increasing in importance as a result of the use of electronic communications in more and more business activities. Cryptography is the only practical means to provide security services in many applications. Research into cryptography has exploded in the last 18 years and a variety of cryptographic algorithms and techniques have emerged. Cryptographic algorithms may be classified as either symmetric, if the same key is shared by the sender and receiver, or asymmetric, if they use different keys. Symmetric algorithms have been dominated by the Data encryption Standard since 1976, but a number of replacements are now being proposed. Asymmetric, or public key, algorithms allow provision of new security services such as digital signatures. The RSA algorithm is the most widely known of these, but a recently proposed standard for digital signatures is also of intense current interest.
作者:
MATYAS, SMIBM CORP
KINGSTON DEV LABCRYPTOG CTR COMPETENCEKINGSTONNY 12401
A method is presented for controlling cryptographic key usage based on control vectors. Each cryptographic key has an associated control vector that defines the permitted uses of the key within the cryptographic syste...
详细信息
A method is presented for controlling cryptographic key usage based on control vectors. Each cryptographic key has an associated control vector that defines the permitted uses of the key within the cryptographic system. At key generation, the control vector is cryptographically coupled to the key via a special encryption process. Each encrypted key and control vector is stored and distributed within the cryptographic system as a single token. Decryption of a key requires respecification of the control vector. As part of the decryption process, the cryptographic hardware also verifies that the requested use of the key is authorized by the control vector. This paper focuses mainly on the use of control vectors in cryptosystems based on the Data encryption algorithm.
It is shown that some well known cryptographic protocols for authentication are insecure if the underlying cryptographic algorithm does not avoid certain special features. Explicit assumptions based on the fundamental...
详细信息
It is shown that some well known cryptographic protocols for authentication are insecure if the underlying cryptographic algorithm does not avoid certain special features. Explicit assumptions based on the fundamental properties of cryptographic transformations are recommended as a basis for cryptographic protocol design. It is shown how these properties may be used to design alternative forms of the protocols analysed.
Práce se zaměřuje na proudovou analýzu moderních kryptografických modulů. V první části práce je krátký úvod do problematiky proudového postranního kaná...
详细信息
Práce se zaměřuje na proudovou analýzu moderních kryptografických modulů. V první části práce je krátký úvod do problematiky proudového postranního kanálu a do základních metod analýz. V textu je popsaný postup porovnání modulů a krátký popis nalezených zařízení. V praktické části byly vybrány celkem dva moduly pro implementaci šifrovacího algoritmu AES-128. První modul představoval čipovou kartu Gemalto .NET v2 a druhý modul představovalo Raspberry Pi. Pro oba moduly byly úspěšně vytvořeny experimentální pracoviště, které umožňovali měření proudové spotřeby algoritmu AES. Na získaných datech byla provedena diferenciální proudová analýza. V závěrečné části práce jsou shrnuty výsledky do tabulek, jsou vidět ukázkové kódy a grafy vytvořené z naměřených hodnot na modulu Raspberry Pi.
Tato práce se zabývá možností akcelerace šifrovacích algoritmů pomocí rekonfigurovatelných obvodů FPGA a zkoumáním rozdílu rychlosti implementace oproti implementaci s...
详细信息
Tato práce se zabývá možností akcelerace šifrovacích algoritmů pomocí rekonfigurovatelných obvodů FPGA a zkoumáním rozdílu rychlosti implementace oproti implementaci softwarové. Práce popisuje základy šifrování a akcelerace algoritmů na FPGA. Dále se zabývá procesem návrhu, implementace, simulace a syntézy výsledné implementace. Provádí rozbor dosaženého řešení. Cílem projektu bylo vytvořit funkční řešení akcelerovaného algoritmu, tím umožnit jeho další použití v reálném provozu a dále vytvoření česky psaného materiálu o této problematice.
暂无评论