scispace - formally typeset
Search or ask a question
Topic

Cipher

About: Cipher is a research topic. Over the lifetime, 9409 publications have been published within this topic receiving 110309 citations. The topic is also known as: cypher & cryptographic algorithm.


Papers
More filters
Proceedings ArticleDOI
08 Oct 2007
TL;DR: The results indicate that genetic algorithm is successful at breaking the four-round DES cipher, but perhaps more significantly, this is a promising method applied to break other Feistel block cipher.
Abstract: In this paper, we present a new approach for cryptanalysis of four-round DES based on genetic algorithm. An efficient fitness measure is used to find some optimum keys with higher fitness values. Some valuable bits in these optimum keys which generate apparent deviation from the other observed bits will turn up. Then, these valuable bits can be applied to find other bits. The results indicate that genetic algorithm is successful at breaking the four-round DES cipher, but perhaps more significantly, this is a promising method applied to break other Feistel block cipher.

33 citations

Proceedings ArticleDOI
19 Sep 2012
TL;DR: Work on designing and implementing a patient-centric, personal health record cloud platform based on open-source Indivo X system adopts cipher text-policy attribute-based encryption to provide privacy protection and fine-grained access control.
Abstract: Work on designing and implementing a patient-centric, personal health record cloud platform based on open-source Indivo X system. We adopt cipher text-policy attribute-based encryption to provide privacy protection and fine-grained access control.

33 citations

Journal ArticleDOI
TL;DR: The proposed image cryptosystem is characterized by a short encryption time of scalevariant images and a high level of confusion and diffusion due to its shuffling and substitution processes.
Abstract: This paper proposes a design of 2-D chaotic Baker map for image encryption which utilizes three modes of operations: 1) the cipher block chaining (CBC) mode, 2) the cipher feedback (CFB) mode, and 3) the output feedback (OFB) mode. The proposed image cryptosystem is characterized by a short encryption time of scalevariant images and a high level of confusion and diffusion due to its shuffling and substitution processes. This is useful in applications such as online streaming of paid videos, in which both the speed of encryption\decryption and a good encryption quality is required. A comparison between the proposed image cryptosystem, the traditional 2-D chaotic Baker map permutation cryptosystem, and the RC6 substitution cryptosystem is presented in the paper. A comparison is held with relevant techniques and the results reveal that the proposed image cryptosystem achieves a high degree of security. It is also more immune to noise than the RC6 cryptosystem and takes less processing time for images with large dimensions than both the chaotic cryptosystem and the RC6 cryptosystem. The superiority of the proposed cryptosystem has been proved for image encryption against the recent techniques from the cryptographic viewpoint.

33 citations

Patent
26 Oct 2016
TL;DR: In this paper, an encryption storage system for block chains is proposed, which consists of file groups (S), open file systems (OFS), and lock box devices (LDBs).
Abstract: The invention provides an encryption storage system for block chains. The encryption storage system comprises file groups (S) (1), open file systems (2) and lock box devices (3). The file groups (S) are used for reducing the amounts of secret key exchange between users, differentiating file reading and writing, effectively processing and revoking access rights of the users and allowing authorization files of a distrusted server to carry out write operation; the open file systems are used for embedding encryption storage system prototypes of the block chains and comprise authentication databases; the lock box devices comprise a plurality of secrete key distribution schemes, and safety strategies and authentication mechanisms can be customized for files of each user by the aid of one of multiple client-based secret key distribution schemes. The invention further discloses a method for applying the encryption storage system for the block chains. The encryption storage system and the method have the advantages that the problem of possibly insufficient capacity of server sides due to expensive cipher computation can be solved by the aid of the encryption storage system and the method; the files can be accessed when file owners are offline, and accordingly the trouble of the requirement on contact with the corresponding file owner when each file needs to be accessed can be prevented.

33 citations

Proceedings Article
19 Jun 2011
TL;DR: A novel Bayesian approach for deciphering complex substitution ciphers which combines information from letter n-gram language models as well as word dictionaries is introduced and demonstrated by cracking the famous Zodiac-408 cipher in a fully automated fashion.
Abstract: We introduce a novel Bayesian approach for deciphering complex substitution ciphers Our method uses a decipherment model which combines information from letter n-gram language models as well as word dictionaries Bayesian inference is performed on our model using an efficient sampling technique We evaluate the quality of the Bayesian decipherment output on simple and homophonic letter substitution ciphers and show that unlike a previous approach, our method consistently produces almost 100% accurate decipherments The new method can be applied on more complex substitution ciphers and we demonstrate its utility by cracking the famous Zodiac-408 cipher in a fully automated fashion, which has never been done before

33 citations


Network Information
Related Topics (5)
Cryptography
37.3K papers, 854.5K citations
90% related
Encryption
98.3K papers, 1.4M citations
89% related
Authentication
74.7K papers, 867.1K citations
85% related
Public-key cryptography
27.2K papers, 547.7K citations
85% related
Key (cryptography)
60.1K papers, 659.3K citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023155
2022309
2021343
2020415
2019509
2018487