scispace - formally typeset
Search or ask a question
Topic

Cipher

About: Cipher is a research topic. Over the lifetime, 9409 publications have been published within this topic receiving 110309 citations. The topic is also known as: cypher & cryptographic algorithm.


Papers
More filters
Journal ArticleDOI
TL;DR: The Tiny Encryption Algorithm is described, its simplicity of design and ease of use, its cryptographic strength, and the wide range of implementations and applications of the cipher.
Abstract: The Tiny Encryption Algorithm (TEA) has been around for just over ten years. It is probably the most "minimal"-and hence fastest-block cipher ever devised and yet appears resistant to most attacks. In this article, we describe the algorithm, its simplicity of design and ease of use, its cryptographic strength, and the wide range of implementations and applications of the cipher.

42 citations

Book ChapterDOI
10 Aug 2008
TL;DR: In this article, a real-world hardware-assisted attack on the well-known A5/1 stream cipher is presented, which is still used to secure GSM communication in most countries all over the world.
Abstract: In this paper we present a real-world hardware-assisted attack on the well-known A5/1 stream cipher which is (still) used to secure GSM communication in most countries all over the world. During the last ten years A5/1 has been intensively analyzed [1,2,3,4,5,6,7]. However, most of the proposed attacks are just of theoretical interest since they lack from practicability -- due to strong preconditions, high computational demands and/or huge storage requirements -- or have never been fully implemented. In contrast to these attacks, our attack which is based on the work by Keller and Seitz [8] is running on an existing special-purpose hardware device, called COPACOBANA [9]. With the knowledge of only 64 bits of keystream the machine is able to reveal the corresponding internal 64-bit state of the cipher in about 6 hours on average. We provide a detailed description of our attack architecture as well as implementation results.

42 citations

Patent
01 Feb 2008
TL;DR: In this article, the data disposal is managed on a file basis through the use of a plurality of internally generated file-specific cipher keys, which are managed through the aid of an internal key library.
Abstract: A data storage device (such as a magnetic disk drive), which has a built-in encryption function using a self generated cipher key. The data storage device uses the cipher key to routinely encrypt the incoming data without instruction and/or control by the host system or other components that are external to the device and its dedicated controls (e.g., a disk drive controller card). The encryption function is a built-in function or self-contained function of the drive and/or it dedicated controller. To permanently delete the entire content of the drive, the cipher key is located and erased to render the ciphertext that is stored in the storage device unusable. In another embodiment of the present invention, the data disposal is managed on a file basis through the use of a plurality of internally generated file-specific cipher keys, which are managed through the aid of an internal key library.

42 citations

Proceedings ArticleDOI
01 Feb 2017
TL;DR: This paper proposed the security analysis as well as performance parameter of the LiCi, a new lightweight, low power block cipher which resists the linear and differential attack and shows the good resistance against the advanced attack like Biclique and Zero correlation.
Abstract: In this paper, we have presented a new lightweight, low power block cipher “LiCi”. The cipher LiCi has Feistel based network which operates on 64 bits plain text and with the help of 128 bits key length it generates 64 bits cipher text. This cipher design shows good performance both on hardware as well as on software platforms. As compared to the existing cipher it requires less footprint area that consumes only 1153 GE's (Gate Equivalents) and has less memory requirements. It also consumes only 30mW which is less power as compared to the other existing ciphers. LiCi cipher needs only 1944 bytes of Flash memory which is very less memory size till date. In this paper, we proposed the security analysis as well as performance parameter of the LiCi. The LiCi cipher resists the linear and differential attack. It also shows the good resistance against the advanced attack like Biclique and Zero correlation. This cipher is well suited for application where small footprint area and low power dissipation are important design metrics.

42 citations

Patent
06 Oct 1964
TL;DR: In this article, a method and apparatus for ciphering and deciphering messages, wherein series of cipher pulses with an identical pulse distribution are generated by the transmitter and the receiver stations and said pulse distribution is determined by a secret basic code and a code which is derived from date and time.
Abstract: Method and apparatus for ciphering and deciphering messages, wherein series of cipher pulses with an identical pulse distribution are generated by the transmitter and the receiver stations and said pulse distribution is determined by a secret basic code and a code which is derived from date and time.

41 citations


Network Information
Related Topics (5)
Cryptography
37.3K papers, 854.5K citations
90% related
Encryption
98.3K papers, 1.4M citations
89% related
Authentication
74.7K papers, 867.1K citations
85% related
Public-key cryptography
27.2K papers, 547.7K citations
85% related
Key (cryptography)
60.1K papers, 659.3K citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023155
2022309
2021343
2020415
2019509
2018487