Computer Science::Multimedia, Computer Science::Cryptography and Security
Abstract
In this paper key-scheduling algorithms having the defined recurrent property are considered. For this class of algorithms we describe related-key attacks. The complexity of the attack is equal to the exhaustive search of one round key. It requires a little number of plaintexts.
Data_GENERAL, Data_MISCELLANEOUS, Computer Science::Multimedia, Data_CODINGANDINFORMATIONTHEORY, Hardware_ARITHMETICANDLOGICSTRUCTURES, Computer Science::Cryptography and Security
Abstract
In this paper we describe a differential attack on a block cipher in a general case. We calculate the attack complexity for different cipher parameters.
Computer Science::Performance, ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS, Data_MISCELLANEOUS, Computer Science::Multimedia, Computer Science::Networking and Internet Architecture, Computer Science::Distributed, Parallel, and Cluster Computing, Computer Science::Cryptography and Security
Abstract
The paper considers the peculiarities of authentication in multi-tier environment and corresponding security problems. The authentication protocol for multi-tier system based on commutative encryption is provided.
Computer Science::Multimedia, Computer Science::Cryptography and Security
Abstract
In the paper, we provide the analysis of perturbed quantization steganography applied to JPEG images. The ability of determining so-called changeable coefficients is discussed and an approach for that is proposed. This approach allows to create stegosystem that would take advantage of properties of perturbed quantization steganography but would use images in JPEG format as cover images.
Published
2009
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.