scispace - formally typeset
Search or ask a question
Topic

Cipher

About: Cipher is a research topic. Over the lifetime, 9409 publications have been published within this topic receiving 110309 citations. The topic is also known as: cypher & cryptographic algorithm.


Papers
More filters
Patent
18 Dec 2006
TL;DR: In this paper, a method and apparatus for implementing data security and automatic repeat request (ARQ) in a wireless communication system are disclosed, where each cipher entity is located on top of an outer ARQ entity and the cipher entities cipher and decipher a data block by using a generic sequence number (SN) assigned to the data block.
Abstract: A method and apparatus for implementing data security and automatic repeat request (ARQ) in a wireless communication system are disclosed. Cipher entities are included in a wireless transmit/receive unit (WTRU) and an access gateway (aGW), and outer ARQ, (or radio link control (RLC)), entities are included in the WTRU and an evolved Node-B (eNode-B). Each cipher entity is located on top of an outer ARQ entity. The cipher entities cipher and decipher a data block by using a generic sequence number (SN) assigned to the data block. The outer ARQ entities may segment the ciphered data block to multiple packet data units (PDUs), may concatenate multiple ciphered data blocks to a PDU, or may generate one PDU from one data block. The outer ARQ entities may segment or re-segment the PDU when a transmission failure occurs.

44 citations

Proceedings ArticleDOI
01 Oct 2012
TL;DR: The security structure of sensor layer, network layer, and application layer in IOT is described, and dynamic variable cipher security certificate is presented, a new method of ID authentication among node and node in sensor layer.
Abstract: With the development of Internet of Things (IOT), there are more and more concerns about the security of IOT. In terms of security of Internet, the security framework of Internet can not provide a completely solution to solve all security problems in IOT [1]. This paper describes the security structure of sensor layer, network layer, and application layer in IOT. This thesis intends to analyze the security features of sensor layer, and then presents dynamic variable cipher security certificate, a new method of ID authentication among node and node in sensor layer. This certificate provides a method of “one time one cipher” between communicating parties. It's a lightweight encryption or decryption method, using time stamp technology, timeliness in the two communication partners is guaranteed. In general, dynamic variable cipher security certificate can be well applied to the communication among sensor nodes in IOT.

44 citations

Journal Article
TL;DR: The first known attack on 6-round IDEA was presented in this article, which exploits the weak keyschedule algorithm of IDEA, and combines Square-like techniques with linear cryptanalysis to increase the number of rounds that can be attacked.
Abstract: IDEA is a 64-bit block cipher with 128-bit keys introduced by Lai and Massey in 1991. IDEA is one of the most widely used block ciphers, due to its inclusion in several cryptographic packages, such as PGP. Since its introduction in 1991, IDEA has withstood extensive cryptanalytic effort, but no attack was found on the full (8.5-round) variant of the cipher. In this paper we present the first known attack on 6-round IDEA faster than exhaustive key search. The attack exploits the weak keyschedule algorithm of IDEA, and combines Square-like techniques with linear cryptanalysis to increase the number of rounds that can be attacked. The attack is the best known attack on IDEA. We also improve previous attacks on 5-round IDEA and introduce a 5-round attack which uses only 16 known plaintexts.

43 citations

12 Nov 2007
TL;DR: Two techniques are proposed for enhancing the message secrecy using image based steganography based on the use of punctuation marks and modified scytale cipher to hide a secret message in an image file.
Abstract: Image based steganography is the most popular method for message concealment. In this paper, two techniques are proposed for enhancing the message secrecy using image based steganography. The first technique is based on the use of punctuation marks to encode a secret message before embedding it into the image file. The second technique is based on the use of modified scytale cipher to hide a secret message in an image file. Both of these techniques have been implemented and tested using the S-Tools software package. The original and stego-images both are shown for the purpose of comparison

43 citations

Book ChapterDOI
14 Aug 2016
TL;DR: An attack on the early version of FLIP is presented that exploits the structure of the filter function and the constant internal state of the cipher to allow for a key recovery in basic operations.
Abstract: At Eurocrypt 2016, Meaux et al. proposed FLIP, a new family of stream ciphers intended for use in Fully Homomorphic Encryption systems. Unlike its competitors which either have a low initial noise that grows at each successive encryption, or a high constant noise, the FLIP family of ciphers achieves a low constant noise thanks to a new construction called filter permutator. In this paper, we present an attack on the early version of FLIP that exploits the structure of the filter function and the constant internal state of the cipher. Applying this attack to the two instantiations proposed by Meaux et al. allows for a key recovery in $$2^{54}$$ basic operations resp. $$2^{68}$$, compared to the claimed security of $$2^{80}$$ resp. $$2^{128}$$.

43 citations


Network Information
Related Topics (5)
Cryptography
37.3K papers, 854.5K citations
90% related
Encryption
98.3K papers, 1.4M citations
89% related
Authentication
74.7K papers, 867.1K citations
85% related
Public-key cryptography
27.2K papers, 547.7K citations
85% related
Key (cryptography)
60.1K papers, 659.3K citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023155
2022309
2021343
2020415
2019509
2018487