In this paper a new family of cryptographic hash-functions is described. The main goal was to create a such hash function, where algorithm varies depending on hash code length. hash function Hamsi was taken as basis o...
详细信息
In this paper a new family of cryptographic hash-functions is described. The main goal was to create a such hash function, where algorithm varies depending on hash code length. hash function Hamsi was taken as basis of a parameterized algorithm. This hash function was analyzed in a different ways. For a linear transformation, whole class of linear transformations with the same branch numbers was defined. For this class were found invariant subspaces. The second part of the analysis was a research of differential attacks on Hamsi compression function. After the analysis of published works, changes were made to compression function. With these changes a parameterized hash function Hansi-n was described, that produces n bit of hash code (e.g. 512, 1024, 2048). To find out complexity of different versions of algorithm, the estimation of bitwise operations needed for one compression function evaluation is described. This new hash-functions can be used in a lot of applications, where hash-codes of varying length are needed.
In this paper, we give an explicit construction of a family of capacity-achieving binary t-write WOM codes for any number of writes t, which have polynomial time encoding and decoding algorithms. The block length of o...
详细信息
In this paper, we give an explicit construction of a family of capacity-achieving binary t-write WOM codes for any number of writes t, which have polynomial time encoding and decoding algorithms. The block length of our construction is N = (t/epsilon)(O(t/(delta epsilon))) when epsilon is the gap to capacity and encoding and decoding run in time N1+ delta. This is the first deterministic construction achieving these parameters. Our techniques also apply to larger alphabets.
This paper presents a new algorithm for DDoS attacks detection based on analysis of network traffic as a dynamical system. We applied author's approach that enables to describe relations between traffic characteri...
详细信息
ISBN:
(纸本)9781538694565
This paper presents a new algorithm for DDoS attacks detection based on analysis of network traffic as a dynamical system. We applied author's approach that enables to describe relations between traffic characteristics in different time slices using casual Hilbert operator. The algorithm consists of operations for: (1) converting the primary network traffic characteristics (data packets headers) into intermediate and secondary informative characteristics required for creating traffic classification rules;(2) forming traffic patterns in the form of histograms of secondary informative characteristics;(3) attacks detection and histogram-based modeling classification based on Bayesian decision theory.
Bakalářská práce na téma Kryptografické metody zabezpečení dat sestává ze tří částí. V první části jsou rozvedeny obecné teoretické principy, ...
详细信息
Bakalářská práce na téma Kryptografické metody zabezpečení dat sestává ze tří částí. V první části jsou rozvedeny obecné teoretické principy, kterých se v této oblasti využívá. Dále jsou zde zmíněny soudobé i historické kryptografické standardy či algoritmy. Druhá část bakalářské práce poukazuje na možnosti prolomení těchto standardů, na dnes nejpoužívanější kryptoanalytické principy a jejich aplikaci v praxi, obzvláště v oblasti počítačových sítí a jejich služeb. Závěrečná část obsahuje popis vývoje jednoduché počítačové aplikace, která demonstruje použití kryptografických metod v zabezpečení souborů v osobním počítači.
ISO/IEC 9797-3:2011 specifies the following Message Authentication Code (MAC) algorithms that use a secret key and a universal hash-function with an n-bit result to calculate an m-bit MAC based on the block ciphers sp...
详细信息
标准号:
ISO/IEC 9797-3-2011
ISO/IEC 9797-3:2011 specifies the following Message Authentication Code (MAC) algorithms that use a secret key and a universal hash-function with an n-bit result to calculate an m-bit MAC based on the block ciphers specified in ISO/IEC 18033-3 and the stream ciphers specified in ISO/IEC 18033-4:
***;***;***1305-AES;***.
暂无评论