Search scope:
排序: Display mode:
Analysis of A Block Cipher Based on Chaos
Jin Chenhui
Strategic Study of CAE 2001, Volume 3, Issue 6, Pages 75-80
In this paper, it is pointed out that the block cipher proposed in “Design of Block Cipher substitution; can be broken by attack with known plaintext and attack with ciphertext only, and the key of this cipher
Keywords: chaos sequence block cipher transposition cipher attack with known plaintext attack with ciphertext only
Fan ZHANG, Zi-yuan LIANG, Bo-lin YANG, Xin-jie ZHAO, Shi-ze GUO, Kui REN
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 12, Pages 1475-1499 doi: 10.1631/FITEE.1800576
The Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR) supported by the National Institute of Standards and Technology (NIST) is an ongoing project calling for submissions of authenticated encryption (AE) schemes. The competition itself aims at enhancing both the design of AE schemes and related analysis. The design goal is to pursue new AE schemes that are more secure than advanced encryption standard with Galois/counter mode (AES-GCM) and can simultaneously achieve three design aspects: security, applicability, and robustness. The competition has a total of three rounds and the last round is approaching the end in 2018. In this survey paper, we first introduce the requirements of the proposed design and the progress of candidate screening in the CAESAR competition. Second, the candidate AE schemes in the final round are classified according to their design structures and encryption modes. Third, comprehensive performance and security evaluations are conducted on these candidates. Finally, the research trends of design and analysis of AE for the future are discussed.
Keywords: CAESAR competition Authenticated cipher Block cipher Stream cipher Hash function Security evaluation
Design of Block Cipher Substitution Network on Chaos
Sun Feng,Qin Honglei,Xu Yiaoqun,Hao Yianling
Strategic Study of CAE 2000, Volume 2, Issue 9, Pages 47-49
In this paper, a design of block cipher substitution network is presented by use of the ergodic theoryThe computer simulation result shows that the block cipher substitution network of chaos is highly complex
Keywords: chaos sequence permutation network ergodic theory time complexity
BORON: an ultra-lightweight and low power encryption design for pervasive computing Article
Gaurav BANSOD,Narayan PISHAROTY,Abhijit PATIL
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 3, Pages 317-331 doi: 10.1631/FITEE.1500415
Keywords: Lightweight cryptography SP network Block cipher Internet of Things (IoT) Encryption Embedded security
Design and implementation of various datapath architectures for the ANU lightweight cipher on an FPGA Personal View
Vijay DAHIPHALE, Gaurav BANSOD, Ankur ZAMBARE, Narayan PISHAROTY
Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 4, Pages 615-628 doi: 10.1631/FITEE.1800681
Keywords: Lightweight cryptography Internet of Things (IoT) Embedded security Encryption FPGA Datapath design
Title Author Date Type Operation
Survey of design and security evaluation of authenticated encryption algorithms in theCAESARcompetition
Fan ZHANG, Zi-yuan LIANG, Bo-lin YANG, Xin-jie ZHAO, Shi-ze GUO, Kui REN
Journal Article
Design of Block Cipher Substitution Network on Chaos
Sun Feng,Qin Honglei,Xu Yiaoqun,Hao Yianling
Journal Article
BORON: an ultra-lightweight and low power encryption design for pervasive computing
Gaurav BANSOD,Narayan PISHAROTY,Abhijit PATIL
Journal Article