scispace - formally typeset
Search or ask a question
Topic

Cipher

About: Cipher is a research topic. Over the lifetime, 9409 publications have been published within this topic receiving 110309 citations. The topic is also known as: cypher & cryptographic algorithm.


Papers
More filters
Proceedings ArticleDOI
03 Dec 2011
TL;DR: An CP2-ABSC construction from pairings which is more efficient than the combination of CP-ABE and CP-Abs that provide the same functionality of authenticated encryption is proposed.
Abstract: We propose a new notion called attribute-based sign-cryption with cipher text-policy and claim-predicate mechanism (CP2-ABSC), which is inspired by the recent developments in attribute-based encryption and attribute-based signature. In this notion, a signcrypting party, who possesses a set of attributes from the authority, can sign a message with a claim-predicate that is satisfied by his attributes, and encrypt it with an access policy stating what kind of receivers will be able to decrypt the message. As in ciphertext-policy attribute-based encryption (CP-ABE), a user will only be able to decrypt a signcrypted message if that user's attributes satisfy the access policy associated to the signcrypted message. As in attribute-based signature with claim-predicate mechanism (CP-ABS), a unsigncrypting party can verify the authenticity of the signcrypted message against the claim-predicate over signcrypting party's attributes. We give the formal definition and security model of CP2-ABSC, and propose an CP2-ABSC construction from pairings which is more efficient than the combination of CP-ABE and CP-ABS that provide the same functionality of authenticated encryption. The proposed CP2-ABSC scheme is proved to be secure in the generic group model and random oracle model.

42 citations

Patent
30 Dec 1985
TL;DR: In this paper, the DES encryptor operates in parallel from a common input register containing cipher text bit streams so that the overall throughput of the system is increased approximately by a factor of n.
Abstract: In an encryption system comprising DES in a cipher feedback mode of k bits, a plain text bit stream is fed into n individual DES encryptors. The DES encryptor operates in parallel from a common input register containing cipher text bit streams so that the overall throughput of the system is increased approximately by a factor of n. If k=1 then the system is self-synchronizing.

42 citations

Patent
Hiroshi Miyano1
11 Mar 1994
TL;DR: In this article, a plaintext is enciphered using a plurality of stages in tandem via a plurality-of- iterations, each of the stages is arranged to perform a complex key-dependent computation.
Abstract: A plaintext is enciphered using a plurality of stages in tandem via a plurality of iterations. Each of the stages is arranged to perform a complex key-dependent computation. The stage includes a memory for storing a key. A cipher function circuit transposes, using the key, one block applied to the stage from a preceding stage. An exclusive-or circuit implements an exclusive-or operation of the output of the cipher function and the other block applied to the stage from the preceding stage. A unique arrangement is provided for transposing the output of the cipher function circuit and then applying the output thereof to the memory. Therefore, the key is replaced with the output of the unique arrangement.

42 citations

Journal ArticleDOI
TL;DR: The security and statistical analyses demonstrated that the 3D-ICQM based color image encryption algorithm with round key expansion has better security performance than several existing algorithms.
Abstract: Based on the classic quadratic map (CQM) with abundant bifurcations and periodic windows, a new 3D improved coupling quadratic map (3D-ICQM) is constructed, and its phase diagram, Lyapunov exponent...

42 citations

Proceedings ArticleDOI
01 Dec 2011
TL;DR: An encrypting system which combines techniques of cryptography and steganography with data hiding, instead of using a single level of data encryption, the message is encrypted twice and the cipher is hidden inside the image in encrypted format for further use.
Abstract: Cryptography is the practice for secure communication in the presence of third parties. Steganography is technique of writing hidden messages such that except the sender and receiver, no one even suspects the existence of the message. In today's hi-tech age, threats from intruders are very great such that usage of either of the above techniques separately may not be able to provide the intended protection. In order to increase the level of protection, both the techniques may be used in a combined manner. Multimedia techniques can also be used to hide the data. In this paper, we propose an encrypting system which combines techniques of cryptography and steganography with data hiding. Instead of using a single level of data encryption, the message is encrypted twice. Traditional techniques have been used for this purpose. Then the cipher is hidden inside the image in encrypted format for further use. It uses a reference matrix for selection of passwords depending on the properties of the image. The image with the hidden data is used for further purposes.

42 citations


Network Information
Related Topics (5)
Cryptography
37.3K papers, 854.5K citations
90% related
Encryption
98.3K papers, 1.4M citations
89% related
Authentication
74.7K papers, 867.1K citations
85% related
Public-key cryptography
27.2K papers, 547.7K citations
85% related
Key (cryptography)
60.1K papers, 659.3K citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023155
2022309
2021343
2020415
2019509
2018487