Topic
Cipher
About: Cipher is a research topic. Over the lifetime, 9409 publications have been published within this topic receiving 110309 citations. The topic is also known as: cypher & cryptographic algorithm.
Papers published on a yearly basis
Papers
More filters
••
15 Mar 2005
TL;DR: In his piper, the petfarmme of applicalion of fijndxl Cipher (Am) and KAWR Cipher to Bitv images is shrdied comparing the qualiw of encryption of the two ciphers when inlroducing inmge encryption 7be method, and a meme for encryp~iion quality is introduced.
Abstract: mina avman@,yioo.com Abstract: In his piper, the petfarmme of applicalion of fijndxl Cipher (Am) and KAWR Cipher to Bitv images is shrdied comparing the qualiw of encryption of the two ciphers when inlroducing inmge encryption 7be method 01 opplicaiion of the ciphers io EMF images ir explained A mw meme for encryp~iion quality is introduced insteud of judging the encryption quality by mere visual inrpecrion To test this encvption pdity -mmiue, we encrypt the imuges using huo dt@erent ~pproorhes. the Elec@onic Codpbook (ECB) mode grid the Ciph;;j-Bi+k Chaining (CBC) mode. We pr? that +be .numerical re*& given ly &U pnqx~~d m+waring technique agree wilh !hare taken by visual impection MdpreviouE results known wore about the &ormame o/ ECB and CBC mds in image enctyption
60 citations
•
TL;DR: Based on the analysis and the results available in literature regarding the existing weaknesses of RC4, few additional layers over the RC4 KSA and RC4 Pseudo-Random Generation Algorithm (PRGA) are proposed in this paper.
Abstract: In this paper, the RC4 Key Scheduling Algorithm (KSA) is theoretically studied to reveal non-uniformity in the expected number of times each value of the permutation is touched by the indices i, j. Based on our analysis and the results available in literature regarding the existing weaknesses of RC4, few additional layers over the RC4 KSA and RC4 Pseudo-Random Generation Algorithm (PRGA) are proposed. Analysis of the modified cipher (we call it RC4) shows that this new strategy avoids existing weaknesses of RC4.
59 citations
01 Oct 1999
TL;DR: This document proposes the addition of new cipher suites to the TLS protocol to support Kerberos-based authentication.
Abstract: This document proposes the addition of new cipher suites to the TLS protocol [1] to support Kerberos-based authentication. Kerberos credentials are used to achieve mutual authentication and to establish a master secret which is subsequently used to secure client-server communication.
59 citations
••
01 Jan 1983TL;DR: This note describes five regular properties of the ‘Data Encryption Standard’ or DES, two of which have been described elsewhere and are included for completeness.
Abstract: A cipher function y = E(k,x) should appear to be a random function of both the key k and the plaintext x Any regular behaviour is of interest to the users In the extreme case regular properties might point to a weakness of the cipher Precautions are needed in the use of a cipher that has regular features This note describes five regular properties of the ‘Data Encryption Standard’ or DES, two of which have been described elsewhere, are included for completeness
59 citations
•
05 Jul 1985TL;DR: In this article, a pay program signal is scrambled in an exclusive OR circuiit by a scrambling signal (Ks) derived from a random number generator, and the cipher signal (Ei1) is stored in a RAM of a subscriber.
Abstract: A pay program signal is scrambled in an exclusive OR circuiit by a scrambling signal (Ks) derived from a random number generator. The pay program signal is converted into a broadcasting signal by a converter. A transmission information processor alters every month, for example, the contents of an initial value signal applied to the random number generator in order to change a scramble mode. The information processor transmits, via the converter, cipher signal (Ei) for descrambling the pay program signal in, for example, the next month. The cipher signal (Ei1) is stored in a RAM of a subscriber. At this time, a memory area into which the cipher signal (Ei1) is to be stored is designated by a distribution page flag (DP) transmitted from the information processor. The information processor also designates the memory area storing the cipher signal (Ei1), by means of a reference page flag (RF), which is to be used. The key data is used as data to determine a descramble mode of the random number generator.
59 citations