scispace - formally typeset
Search or ask a question
Topic

40-bit encryption

About: 40-bit encryption is a research topic. Over the lifetime, 5434 publications have been published within this topic receiving 149016 citations.


Papers
More filters
01 Jan 2010
TL;DR: The Advanced Encryption Standard (AES) is the current standard for secret key encryption and uses a combination of Exclusive-OR operations (XOR), octet substitution with an S-box, row and column rotations, and a MixColumn.
Abstract: Advanced Encryption Standard (AES) is the current standard for secret key encryption. AES was created by two Belgian cryptographers, Vincent Rijmen and Joan Daemen, replacing the old Data Encryption Standard (DES). The Federal Information Processing Standard 197 used a standardized version of the algorithm called Rijndael for the Advanced Encryption Standard. The algorithm uses a combination of Exclusive-OR operations (XOR), octet substitution with an S-box, row and column rotations, and a MixColumn. It was successful because it was easy to implement and could run in a reasonable amount of time on a regular computer.

38 citations

Journal Article
TL;DR: It is demonstrated that the produced key streams have good statistical properties, such as uniform distribution, δ'like au to'correlation function, near'zero cross'correlatio n and very height sensitivity to initial conditions, under precision restricted condition.
Abstract: In recent years, growing number of cryptosystems based on chaos have been proposed. However, most of them encounter some problems such as: low level of security and small key space. The key stream generator is the key design issue of an encryption system. It directly determines security and efficiency, but most of the proposed key streams are binary valued, and suffer from short period and limited key space. In this paper, we propose an n'ary key stream gene rator, based on hierarchical combination of three chaotic maps. We demonstrate that the produced key streams have good statistical properties, such as uniform distribution, δ'like au to'correlation function, near'zero cross'correlatio n and very height sensitivity to initial conditions, under precision restricted condition. An image cryptosystem is constructed using the proposed approach and proven to be enough secure to resist various attacks. Complexity is analysed and an effective acceleration of chaos'based image cryptosystems is shown to be achi evable.

38 citations

Book ChapterDOI
30 Mar 2015
TL;DR: This work shows by counter-example that the soundness security requirement for witness encryption given by Garg, Gentry, Sahai and Waters (STOC 2013) does not suffice for the security of their own applications, and introduces adaptively-sound (AS) witness encryption to fill the gap.
Abstract: We show by counter-example that the soundness security requirement for witness encryption given by Garg, Gentry, Sahai and Waters (STOC 2013) does not suffice for the security of their own applications. We introduce adaptively-sound (AS) witness encryption to fill the gap. We then introduce asymmetric password-based encryption (A-PBE). This offers gains over classical, symmetric password-based encryption in the face of attacks that compromise servers to recover hashed passwords. We distinguish between invasive A-PBE schemes (they introduce new password-based key-derivation functions) and non-invasive ones (they can use existing, deployed password-based key-derivation functions). We give simple and efficient invasive A-PBE schemes and use AS-secure witness encryption to give non-invasive A-PBE schemes.

38 citations

Patent
Rony S. Shapiro1
06 Mar 2015
TL;DR: In this article, a method for encrypting data on a disk drive using self encrypting drive is provided, which includes encryption of data chunks of a computing device and associating the encrypted data chunks with encryption key indexes of the computing device.
Abstract: A method for encrypting data on a disk drive using self encrypting drive is provided. The method includes encryption of data chunks of a computing device. The method further includes associating the encrypted data chunks with encryption key indexes of the computing device. Moreover, the method further includes receiving the encryption key indexes for given logical block addresses of the data chunks. The method further includes determining the encryption keys to be used to encrypt the data chunks based on the encryption key indexes of the data chunks to the disk drive.

38 citations

Patent
03 Jun 2009
TL;DR: In this paper, a method for efficiently deriving a traffic encryption key for data encryption is presented, which comprises the steps of receiving, by a mobile station from base station, a first nonce and first security materials for deriving the traffic encrypted key (TEK) and deriving TEK using one or more of the first nonces, the authentication key (AK), and the first security material.
Abstract: A method for efficiently deriving a traffic encryption key for data encryption is disclosed. A method of generating a traffic encryption key (TEK) comprises the steps of receiving, by a mobile station from base station, a first nonce and first security materials for deriving the traffic encryption key (TEK) and deriving the traffic encryption key (TEK) using one or more of the first nonce, the authentication key (AK), and the first security materials.

38 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
90% related
Cryptography
37.3K papers, 854.5K citations
89% related
Authentication
74.7K papers, 867.1K citations
86% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
81% related
Wireless ad hoc network
49K papers, 1.1M citations
80% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202370
2022145
20213
20205
20194