Journal ArticleDOI
Foiling an exhaustive key-search attack
TLDR
It is proposed that simple substitution, applied both before and after encipherment by the Data Encryption Standard (DES) cipher, will make that encryption safe against an exhaustive key-search attack based on the DES key.Abstract:
It is proposed that simple substitution, applied both before and after encipherment by the Data Encryption Standard (DES) cipher, will make that encryption safe against an exhaustive key-search attack based on the DES key.read more
Citations
More filters
Journal ArticleDOI
A proposed mode for triple-DES encryption
TL;DR: A new mode of multiple encryption—triple-DES external feedback cipher block chaining with output feedback masking is proposed to provide increased protection against certain attacks (dictionary attacks and matching ciphertext attacks) which exploit the short message-block size of DES.
Patent
Dynamic substitution combiner and extractor
TL;DR: In this paper, the combiner substitution tables can be forced to be invertible, and when they are, extraction is possible by substitution through inverse tables, provided that the same second data is used by both mechanisms.
A Complete Bibliography of Publications in Cryptologia
TL;DR: (t,m) [?]. (t, n) [?"].
Journal ArticleDOI
Privacy enhanced mail design and implementation perspectives
D. F. Hadj Sadok,Judith Kelner +1 more
TL;DR: This paper discusses some of the current problematic issues of PEM and introduces a PEM User Agent developed to test some of its concepts and a conclusion on the future directions of P EM and other related work is given.