Lecture Notes in Computer Science
|
|
|
- Beryl Goodman
- 10 years ago
- Views:
Transcription
1 Lecture Notes in Computer Science Edited by G. Goos, J. Hartmanis and J. van Leeuwen 1267 Advisory Board: W. Brauer D. Gries J. Stoer
2 Springer Berlin Heidelberg New York Barcelona Budapest Hong Kong London Milan Paris Santa Clara Singapore Tokyo
3 Eli Biham (Ed.) Fast Software Encryption 4th International Workshop, FSE'97 Haifa, Israel, January 20-22, 1997 Proceedings Springer
4 Series Editors Gerhard Goos, Karlsruhe University, Germany Juris Hartmanis, Cornell University, NY, USA Jan van Leeuwen, Utrecht University, The Netherlands Volume Editor Eli Biham Technion -- Israel Institute of Technology, Computer Science Department Haifa 32000, Israel cs.technion,ac.il Cataloging-in-Publication data applied for Die Deutsche Bibliothek - CIP-Einheitsaufnahme Fast software encryption : 4th international workshop ; proceedings / FSE '97, Haifa, Israel, January 20-22, Eli Biham (ed.). - Berlin ; Heidelberg ; New York ; Barcelona ; Budapest ; Hong Kong ; London ; Milan ; Paris ; Santa Clara ; Singapore ; Tokyo : Springer, 1997 (Lecture notes in computer science ; Vol. 1267) ISBN CR Subject Classification (1991): F.3, F.2.1, E.4, G.2.1, G.4 ISSN ISBN Springer-Verlag Berlin Heidelberg New York This work is subject to copyright All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer -Verlag. Violations are liable for prosecution under the German Copyright Law. 9 Springer-Verlag Berlin Heidelberg 1997 Printed in Germany Typesetting: Camera-ready by author SPIN / Printed on acid-free paper
5 Preface This fast software encryption workshop (FSE) follows the previous three workshops held in Cambridge in December 1993, in Leuven in December 1994, and in Cambridge in February The workshop was organized in cooperation with the International Association for Cryptologic Research (IACR), and with the kind support of Algorithmic Research and of Microsoft. It was held at the Technion (Haifa, Israel), January 20-22, The programme committee consisted of Eli Biham (Technion - chair), Ross Anderson (Cambridge University), Don Coppersmith (IBM Research), Cunsheng Ding (Turku), Dieter Gollmann (Royal Holloway), Jim Massey (ETH Zurich), Mitsuru Matsui (Mitsubishi), and Bart Preneel (Katholieke Universiteit Leuven). Next year's fast software encryption workshop will be organized by Serge Vaudenay and will be held in Paris. This series of workshops concentrates on the theory and practice of fast cryptography, and in particular of blockciphers, stream ciphers, hash functions, and message authentication codes. The presentations deal with new suggestions of such cryptographic primitives, their design, and their analysis. Special preference is given to the applicability of these primitives in software, and their fast implementations. On the other hand, applications and analyses of other cryptographic primitives, and in particular of public key cryptosystems, are beyond the scope of the workshops, and their design and analysis is dealt with in other conferences and workshops on cryptography. This year, 44 papers were submitted to the workshop. Each of these papers was refereed by at least three programme committee members. All the reports were later sent to the respective authors. Based on the reports, 23 papers were selected for presentation at the workshop, including seven papers on cryptanalysis, four papers suggesting new blockciphers, three dealing with stream ciphers, three with message authentication codes, three with modes of operation, and three papers with the core of fast software encryption, i.e., how to design fast encryption in software. In addition, two discussion sessions were held: a discussion on the requirements and evaluation criteria for the Advanced Encryption Standard, whose development process was recently announced by the US National Institute of Standards and Technology (NIST), and a discussion on the security of cryptosystems and the relation between theory and practice. The minutes of the first discussion are included in these proceedings. The workshop was organized almost entirely using and WWW. A home page was created for the workshop, through which all the information on the workshop was distributed: the call for papers, registration and general information, acceptance of papers, and the workshop's program. All the papers were submitted using (except for two papers submitted in paper form), and
6 vi Preface all the distribution of papers to the programme committee and the discussions of the programme committee were done using . In addition, all the papers were processed directly from their ~TEX files, using the llncs style, and were automatically merged into these proceedings. These proceedings follow the tradition of this series of workshops whose proceedings have been published in Springer-Verlag's Lecture Notes in Computer Science (LNCS) series: The proceedings of the first FSE workshop, held in Cambridge in 1993, were published as LNCS 809, the proceedings of the second FSE workshop, held in Leuven in 1994, were published as LNCS 1008, and the proceedings of the third FSE workshop, held in Cambridge in 1996, were published as LNCS I would like to thank the authors for their submissions and the participants for attending the workshop. The programme committee deserves special thanks for their hard work. Simon Blackburn, Antoon Bosselaers, Karl Brincat, Mike Burmester, Lars Knudsen, Sean Murphy, Kenneth G. Paterson, Vincent Rijmen, Serge Vaudenay, and Peter Wild are acknowledged for their services as external referees. It is also a pleasure to thank the Department of External Studies of the Technion, and in particular Pnina Sasson, who made all the local arrangements, and to thank Yvonne Sagi for her help in preparing some of the material for the workshop. Finally, special thanks go to the sponsors for their generous support. May 1997 Eli Biham
7 Contents 1. Cryptanalysis I x 2 Cryptanalysis of the SEAL Encryption Algorithm Helena Handschuh, Henri Gilbert... 1 Partitioning Cryptanalysis Carlo Harpes, James L. Massey The Interpolation Attack on Block Ciphers Thomas Jakobsen, Lars R. Knudsen Best Differential Characteristic Search of FEAL Kazumaro Aoki, Kunio Kobayashi, Shiho Moriai Blockciphers I New Block Encryption Algorithm MISTY Mitsuru Matsui The Design of the ICE Encryption Algorithm Matthew Kwan Discussion Advanced Encryption Standard, Draft Minimum Requirements and Evaluation Criteria Stream Ciphers TWOPRIME: A Fast Stream Ciphering Algorithm Cunsheng Ding, Valtteri Niemi, Ari Renvall, Arto Salomaa On Nonlinear Filter Generators Markus Dichtl Chameleon -- A New Kind of Stream Cipher Ross Anderson, Charalampos Manifavas Cryptanalysis II Improving Linear Cryptanalysis of LOKlgl by Probabilistic Counting Method Kouichi Sakurai, Souichi Furuya Cryptanalyszs of Ladder-DES Eli Biham A Family of Trapdoor Ciphers Vincent Rijmen, Bart Preneel
8 viii Contents 6. Blockciphers II The Block Cipher Square Joan Daemen, Lars Knudsen, Vincent Rijmen xmx - A Firmware-Oriented Block Cipher Based on Modular Multiplications David M'Ra'ihi, David Naccache, Jacques Stern, Serge Vaudenay Message Authentication Codes MMH: Software Message Authenticatwn in the Gbit/Second Rates Shai Halevi, Hugo Krawczyk Fast Message Authentication Using Efficient Polynomial Evaluation Valentine Afanassiev, Christian Gehrmann, Ben Smeets Reinventing the Travois: Encryption/MAC in 30 ROM Bytes Gideon Yuval Modes of Operation All-or-Nothing Encryption and the Package Transform Ronald L. Rivest On the Security of Remotely Keyed Encryption Stefan Lucks Sliding Encryption: A Cryptographic Tool for Mobile Agents Adam Young, Moti Yung Fast Software Encryption Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor Bruce Schneier, Doug Whiting A Fast New DES Implementation in Software Eli Biham Optimizing a Fast Stream Cipher for VLIW, SIMD, and Superscalar Processors Craig S.K. Clapp Author Index
Lecture Notes in Computer Science 5161
Lecture Notes in Computer Science 5161 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,
Springer-Verlag Berlin Heidelberg GmbH
Information Systems Outsourcing Springer-Verlag Berlin Heidelberg GmbH Rudy Hirschheim Armin Heinzl. Jens Dibbern Editors Information Systems Outsourcing Enduring Themes, Emergent Patterns and Future Directions
The 128-bit Blockcipher CLEFIA Design Rationale
The 128-bit Blockcipher CLEFIA Design Rationale Revision 1.0 June 1, 2007 Sony Corporation NOTICE THIS DOCUMENT IS PROVIDED AS IS, WITH NO WARRANTIES WHATSOVER, INCLUDING ANY WARRANTY OF MERCHANTABIL-
Lecture Notes in Computer Science 3161
Lecture Notes in Computer Science 3161 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,
Java and the Java Virtual Machine
Java and the Java Virtual Machine Springer Berlin Heidelberg New York Barcelona Hong Kong London Milan Paris Singapore Tokyo Robert F. SHirk Joachim Schmid Egon Borger Java and the Java Virtual Machine
Lecture Notes in Computer Science 3422
Lecture Notes in Computer Science 3422 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,
A Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms.
A Comparative Study Of Two Symmetric Algorithms Across Different Platforms. Dr. S.A.M Rizvi 1,Dr. Syed Zeeshan Hussain 2 and Neeta Wadhwa 3 Deptt. of Computer Science, Jamia Millia Islamia, New Delhi,
Understanding Competitive Advantage
Understanding Competitive Advantage Fredrik Nilsson Birger Rapp Understanding Competitive Advantage The Importance of Strategic Congruence and Integrated Control With 44 Figures 4y Springer Professor Dr.
Cryptography and Network Security Chapter 3
Cryptography and Network Security Chapter 3 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 3 Block Ciphers and the Data Encryption Standard All the afternoon
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Julia Juremi Ramlan Mahmod Salasiah Sulaiman Jazrin Ramli Faculty of Computer Science and Information Technology, Universiti Putra
Lecture Notes in Computer Science
Lecture Notes in Computer Science Edited by G. Goos and J. Hartmanis 218 Advances in Cryptology CRYPTO '85 Proceedings Ischnbcha Hochsthule FACH8ESEICH INFORMAL LLLLL2 T H E K 6 Scichgebiete:- v..: Edited
Software Process Automation
Software Process Automation Alan M. Christie Software Process Automation The Technology and Its Adoption With 48 Figures and 19Tables Springer Alan M. Christie Software Engineering Institute Carnegie Mellon
Split Based Encryption in Secure File Transfer
Split Based Encryption in Secure File Transfer Parul Rathor, Rohit Sehgal Assistant Professor, Dept. of CSE, IET, Nagpur University, India Assistant Professor, Dept. of CSE, IET, Alwar, Rajasthan Technical
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 3: Block ciphers and DES Ion Petre Department of IT, Åbo Akademi University January 17, 2012 1 Data Encryption Standard
The Stream Cipher HC-128
The Stream Cipher HC-128 Hongjun Wu Katholieke Universiteit Leuven, ESAT/SCD-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium [email protected] Statement 1. HC-128 supports 128-bit
How To Attack Preimage On Hash Function 2.2 With A Preimage Attack On A Pre Image
Preimage Attacks on 4-Step SHA-256 and 46-Step SHA-52 Yu Sasaki, Lei Wang 2, and Kazumaro Aoki NTT Information Sharing Platform Laboratories, NTT Corporation 3-9- Midori-cho, Musashino-shi, Tokyo, 8-8585
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms Design and Analysis
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms Design and Analysis Kazumaro Aoki Tetsuya Ichikawa Masayuki Kanda Mitsuru Matsui Shiho Moriai Junko Nakajima Toshio Tokita Nippon Telegraph
A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR
A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR William Stallings Copyright 20010 H.1 THE ORIGINS OF AES...2 H.2 AES EVALUATION...3 Supplement to Cryptography and Network Security, Fifth Edition
Lecture Notes in Computer Science 7850
Lecture Notes in Computer Science 7850 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University,
The Advanced Encryption Standard: Four Years On
The Advanced Encryption Standard: Four Years On Matt Robshaw Reader in Information Security Information Security Group Royal Holloway University of London September 21, 2004 The State of the AES 1 The
Serpent: A Proposal for the Advanced Encryption Standard
Serpent: A Proposal for the Advanced Encryption Standard Ross Anderson 1 Eli Biham 2 Lars Knudsen 3 1 Cambridge University, England; email [email protected] 2 Technion, Haifa, Israel; email [email protected]
Ammonia. Catalysis and Manufacture. Springer-Verlag. Berlin Heidelberg New York London Paris Tokyo Hong Kong Barcelona Budapest
Ammonia Catalysis and Manufacture With contributions by K. Aika, L. 1. Christiansen, I. Dybkjaer, 1. B. Hansen, P. E. H0jlund Nielsen, A. Nielsen, P. Stoltze, K. Tamaru With 68 Figures and 23 Tables Springer-Verlag
On the Security of 3GPP Networks
On the Security of 3GPP Networks Michael Walker Vodafone AirTouch & Royal Holloway, University of London Chairman 3GPP SA3 - Security Eurocrypt 2000 Security of 3GPP networks 1 Acknowledgements This presentation
Spatial Data on the Web
Spatial Data on the Web Alberto B elussi B arbara Catania Eliseo Clementini Elena F errari (Eds.) Spatial Data on the Web Modeling and Management With 111 F igures 123 Editors Alberto Belussi University
Securing Data at Rest ViSolve IT Security Team
Securing Data at Rest ViSolve IT Security Team 1 Table of Contents 1 Introduction... 3 2 Why Data at Rest needs to be secure?... 4 3 Securing Data... 4 3.1 Encryption - Access Control Approach... 5 3.1.1
SD12 REPLACES: N19780
ISO/IEC JTC 1/SC 27 N13432 ISO/IEC JTC 1/SC 27 Information technology - Security techniques Secretariat: DIN, Germany SD12 REPLACES: N19780 DOC TYPE: TITLE: Standing document ISO/IEC JTC 1/SC 27 Standing
7! Cryptographic Techniques! A Brief Introduction
7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures
The Advanced Encryption Standard (AES)
The Advanced Encryption Standard (AES) All of the cryptographic algorithms we have looked at so far have some problem. The earlier ciphers can be broken with ease on modern computation systems. The DES
SECRET sharing schemes were introduced by Blakley [5]
206 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 1, JANUARY 2006 Secret Sharing Schemes From Three Classes of Linear Codes Jin Yuan Cunsheng Ding, Senior Member, IEEE Abstract Secret sharing has
International Series on Consumer Science
International Series on Consumer Science For further volumes: http://www.springer.com/series/8358 Tsan-Ming Choi Editor Fashion Branding and Consumer Behaviors Scientific Models 1 3 Editor Tsan-Ming Choi
Automated Firewall Analytics
Automated Firewall Analytics Ehab Al-Shaer Automated Firewall Analytics Design, Configuration and Optimization 123 Ehab Al-Shaer University of North Carolina Charlotte Charlotte, NC, USA ISBN 978-3-319-10370-9
AES-CBC + Elephant diffuser A Disk Encryption Algorithm for Windows Vista
AES-CBC + Elephant diffuser A Disk Encryption Algorithm for Windows Vista Niels Ferguson Microsoft [email protected] August 2006 Abstract The Bitlocker Drive Encryption feature of Windows Vista poses
Helix. Fast Encryption and Authentication in a Single Cryptographic Primitive
Helix Fast Encryption and Authentication in a Single Cryptographic Primitive Niels Ferguson 1, Doug Whiting 2, Bruce Schneier 3, John Kelsey 4, Stefan Lucks 5, and Tadayoshi Kohno 6 1 MacFergus, [email protected]
A Comparison of the 3DES and AES Encryption Standards
, pp.241-246 http://dx.doi.org/10.14257/ijsia.2015.9.7.21 A Comparison of the 3DES and AES Encryption Standards Noura Aleisa [email protected] Abstract A comparison of two encryption standards, 3DES
Corporate Performance Management
Corporate Performance Management August-Wilhelm Scheer Wolfram Jost Helge Heß Andreas Kronz Editors Corporate Performance Management ARIS in Practice With 145 Figures and 5 Tables 123 Professor Dr. Dr.
Permutation-based encryption, authentication and authenticated encryption
Permutation-based encryption, authentication and authenticated encryption Guido Bertoni 1, Joan Daemen 1, Michaël Peeters 2, and Gilles Van Assche 1 1 STMicroelectronics 2 NXP Semiconductors Abstract.
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,
On the Security of Double and 2-key Triple Modes of Operation
On the Security of Double and 2-key Triple Modes of Operation [Published in L. Knudsen, d., Fast Software ncryption, vol. 1636 of Lecture Notes in Computer Science, pp. 215 230, Springer-Verlag, 1999.]
IBM i Encryption in a Snap! Implement IBM FIELDPROC with a simple to use GUI and a few clicks of your mouse.
IBM i Encryption in a Snap! Implement IBM FIELDPROC with a simple to use GUI and a few clicks of your mouse. Presented by Richard Marko, Manager of Technical Services Sponsored by Midland Information Systems,
Oral and Cranial Implants
Oral and Cranial Implants Hugh Devlin Ichiro Nishimura Editors Oral and Cranial Implants Recent Research Developments Editors Hugh Devlin School of Dentistry University of Manchester Manchester United
The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition
The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition Bart Preneel Katholieke Universiteit Leuven and IBBT Dept. Electrical Engineering-ESAT/COSIC, Kasteelpark Arenberg 10 Bus
Studies in the Economics of Uncertainty
Studies in the Economics of Uncertainty Josef Hadar Thomas B. Fomby Tae Kun Sea Editors Studies in the Economics of Uncertainty In Honor of Josef Hadar With 25 Illustrations Springer Verlag New York Berlin
BPS: a Format-Preserving Encryption Proposal
BPS: a Format-Preserving Encryption Proposal Eric Brier, Thomas Peyrin and Jacques Stern Ingenico, France {forenare.nare}@ingenico.cor Abstract. In recent months, attacks on servers of payment processors
Implementing Network Security Protocols
Implementing Network Security Protocols based on Elliptic Curve Cryptography M. Aydos, E. Savaş, and Ç. K. Koç Electrical & Computer Engineering Oregon State University Corvallis, Oregon 97331, USA {aydos,savas,koc}@ece.orst.edu
Network Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1)
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 3 Symmetric Cryptography General Description Modes of ion Data ion Standard (DES)
UNIVERSITY TOP 50 BY SUBJECTS a) Arts and Humanities Universities 2011-2012
Times Higher Education s World University Rankings UNIVERSITY TOP 50 BY SUBJECTS a) Arts and Humanities Universities 2011-2012 Top 50 Arts and Humanities Universities 2011-2012 1 Stanford University United
On the Difficulty of Software Key Escrow
On the Difficulty of Software Key Escrow Lars R. Knudsen and Torben P. Pedersen Katholieke Universiteit Leuven, Belgium, email: [email protected] Cryptomathic, Denmark, email: [email protected]
Multi-Layered Cryptographic Processor for Network Security
International Journal of Scientific and Research Publications, Volume 2, Issue 10, October 2012 1 Multi-Layered Cryptographic Processor for Network Security Pushp Lata *, V. Anitha ** * M.tech Student,
Lecture Notes in Mathematics 2026
Lecture Notes in Mathematics 2026 Editors: J.-M. Morel, Cachan B. Teissier, Paris Subseries: École d Été de Probabilités de Saint-Flour For further volumes: http://www.springer.com/series/304 Saint-Flour
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE SIXTH EDITION William Stallings International Edition contributions by Mohit P Tahiliani NITK Surathkal PEARSON Boston Columbus Indianapolis New
Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT
Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT Onur Özen1, Kerem Varıcı 2, Cihangir Tezcan 3, and Çelebi Kocair 4 1 EPFL IC LACAL Station 14. CH-1015 Lausanne, Switzerland
Spatial Inequalities
Spatial Inequalities GeoJournal Library Volume 110 Managing Editor: Daniel Z. Sui, Columbus, Ohio, USA Founding Series Editor: Wolf Tietze, Helmstedt, Germany Editorial Board: Paul Claval, France Yehuda
The MRI Study Guide for Technologists
The MRI Study Guide for Technologists Kenneth S. Meacham The MRI Study Guide for Technologists With 51 Illustrations Springer-Verlag New York Berlin Heidelberg London Paris Tokyo Hong Kong Barcelona Budapest
Information Security and Cryptography
Information Security and Cryptography Fundamentals and Applications June 1-3, 2015 Zurich, Switzerland Lecturers: David Basin, ETH Zurich Ueli Maurer, ETH Zurich ATG www.infsec.ch Program Starting 09:00
Lecture Notes in Mathematics 2033
Lecture Notes in Mathematics 2033 Editors: J.-M. Morel, Cachan B. Teissier, Paris Subseries: École d Été de Probabilités de Saint-Flour For further volumes: http://www.springer.com/series/304 Saint-Flour
Curriculum vitae. July 2007 present Professor of Mathematics (W3), Technische
Peter Bank Institut für Mathematik, Sekr. MA 7-1 Straße des 17. Juni 136 10623 Berlin Germany Tel.: +49 (30) 314-22816 Fax.: +49 (30) 314-24413 e-mail: [email protected] URL: www.math.tu-berlin.de/
Collaborative Customer Relationship Management
Collaborative Customer Relationship Management Alexander H. Kracklauer D. Quinn Mills Dirk Seifert Editors Collaborative Customer Relationship Management Taking CRM to the Next Level With 99 Figures and
Improved Online/Offline Signature Schemes
Improved Online/Offline Signature Schemes Adi Shamir and Yael Tauman Applied Math. Dept. The Weizmann Institute of Science Rehovot 76100, Israel {shamir,tauman}@wisdom.weizmann.ac.il Abstract. The notion
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
The Advanced Encryption Standard (AES)
The Advanced Encryption Standard (AES) Conception - Why A New Cipher? Conception - Why A New Cipher? DES had outlived its usefulness Vulnerabilities were becoming known 56-bit key was too small Too slow
On the Influence of the Algebraic Degree of the Algebraic Degree of
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 1, JANUARY 2013 691 On the Influence of the Algebraic Degree of the Algebraic Degree of Christina Boura and Anne Canteaut on Abstract We present a
C U R R I C U L U M V I T A E T R I V A N L E
C U R R I C U L U M V I T A E T R I V A N L E Department of Computer Science, 253 Love Building Florida State University, Tallahassee, Florida 32306-4530, USA. Phone: (850) 345-6468, Fax: (850) 644-0058.
Comparison of CBC MAC Variants and Comments on NIST s Consultation Paper
Comparison of CBC MAC Variants and Comments on NIST s Consultation Paper Tetsu Iwata Department of Computer and Information Sciences, Ibaraki University 4 12 1 Nakanarusawa, Hitachi, Ibaraki 316-8511,
Differential Cryptanalysis of Hash Functions: How to find Collisions?
Differential Cryptanalysis of Hash Functions: How to find Collisions? Martin Schläffer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria [email protected]
Publications by Stefan Lucks
Publications by Stefan Lucks Books and Chapters in Books 1. A. Weimerskirch, D. Westhoff, S. Lucks, E. Zenner, Efficient Pairwise Authentication Protocols for Sensor Networks: Theory and Performance Analysis,
Why Cryptosystems Fail. By Ahmed HajYasien
Why Cryptosystems Fail By Ahmed HajYasien CS755 Introduction and Motivation Cryptography was originally a preserve of governments; military and diplomatic organisations used it to keep messages secret.
WINTER SCHOOL ON COMPUTER SECURITY. Prof. Eli Biham
WINTR SCHOOL ON COMPUTR SCURITY Prof. li Biham Computer Science Department Technion, Haifa 3200003, Israel January 27, 2014 c li Biham c li Biham - January 27, 2014 1 Cryptanalysis of Modes of Operation
Evaluating The Performance of Symmetric Encryption Algorithms
International Journal of Network Security, Vol.10, No.3, PP.213 219, May 2010 213 Evaluating The Performance of Symmetric Encryption Algorithms Diaa Salama Abd Elminaam 1, Hatem Mohamed Abdual Kader 2,
F21CN: Computer Network Security: Overview
F21CN: Computer Network Security: Overview Hans-Wolfgang Loidl http://www.macs.hw.ac.uk/~hwloidl School of Mathematical and Computer Sciences Heriot-Watt University, Edinburgh Hans-Wolfgang Loidl (Heriot-Watt
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
Pricing via Processing or Combatting Junk Mail
Pricing via Processing or Combatting Junk Mail Cynthia Dwork Moni Naor Draft of full version Abstract We present a computational technique for combatting junk mail, in particular, and controlling access
Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 12 Block Cipher Standards
Linear Authentication Codes: Bounds and Constructions
866 IEEE TRANSACTIONS ON INFORMATION TNEORY, VOL 49, NO 4, APRIL 2003 Linear Authentication Codes: Bounds and Constructions Huaxiong Wang, Chaoping Xing, and Rei Safavi-Naini Abstract In this paper, we
Lecture Notes in Computer Science 2828 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen
Lecture Notes in Computer Science 2828 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen 3 Berlin Heidelberg New York Hong Kong London Milan Paris Tokyo Antonio Lioy Daniele Mazzocchi (Eds.) Communications
Cryptography and Network Security Block Cipher
Cryptography and Network Security Block Cipher Xiang-Yang Li Modern Private Key Ciphers Stream ciphers The most famous: Vernam cipher Invented by Vernam, ( AT&T, in 1917) Process the message bit by bit
Ding-Zhu Du Editors. Network Security
Network Security Scott C.-H. Huang Ding-Zhu Du Editors David MacCallum Network Security 123 Editors Scott C.-H. Huang Department of Computer Science City University of Hong Kong Tat Chee Avenue 83 Hong
Adaptive Business Intelligence
Adaptive Business Intelligence Zbigniew Michalewicz Martin Schmidt Matthew Michalewicz Constantin Chiriac Adaptive Business Intelligence 123 Authors Zbigniew Michalewicz School of Computer Science University
A New 128-bit Key Stream Cipher LEX
A New 128-it Key Stream Cipher LEX Alex Biryukov Katholieke Universiteit Leuven, Dept. ESAT/SCD-COSIC, Kasteelpark Arenerg 10, B 3001 Heverlee, Belgium http://www.esat.kuleuven.ac.e/~airyuko/ Astract.
Statistical weakness in Spritz against VMPC-R: in search for the RC4 replacement
Statistical weakness in Spritz against VMPC-R: in search for the RC4 replacement Bartosz Zoltak www.vmpcfunction.com [email protected] Abstract. We found a statistical weakness in the Spritz algorithm
1 Data Encryption Algorithm
Date: Monday, September 23, 2002 Prof.: Dr Jean-Yves Chouinard Design of Secure Computer Systems CSI4138/CEG4394 Notes on the Data Encryption Standard (DES) The Data Encryption Standard (DES) has been
The Product Manager s Toolkit
The Product Manager s Toolkit Gabriel Steinhardt The Product Manager s Toolkit Methodologies, Processes and Tasks in High-Tech Product Management ISBN 978-3-642-04507-3 e-isbn 978-3-642-04508-0 DOI 10.1007/978-3-642-04508-0
A Practical Attack on Broadcast RC4
A Practical Attack on Broadcast RC4 Itsik Mantin and Adi Shamir Computer Science Department, The Weizmann Institute, Rehovot 76100, Israel. {itsik,shamir}@wisdom.weizmann.ac.il Abstract. RC4is the most
