scispace - formally typeset
Search or ask a question
Topic

Cipher

About: Cipher is a research topic. Over the lifetime, 9409 publications have been published within this topic receiving 110309 citations. The topic is also known as: cypher & cryptographic algorithm.


Papers
More filters
Proceedings ArticleDOI
15 Mar 2005
TL;DR: In his piper, the petfarmme of applicalion of fijndxl Cipher (Am) and KAWR Cipher to Bitv images is shrdied comparing the qualiw of encryption of the two ciphers when inlroducing inmge encryption 7be method, and a meme for encryp~iion quality is introduced.
Abstract: mina avman@,yioo.com Abstract: In his piper, the petfarmme of applicalion of fijndxl Cipher (Am) and KAWR Cipher to Bitv images is shrdied comparing the qualiw of encryption of the two ciphers when inlroducing inmge encryption 7be method 01 opplicaiion of the ciphers io EMF images ir explained A mw meme for encryp~iion quality is introduced insteud of judging the encryption quality by mere visual inrpecrion To test this encvption pdity -mmiue, we encrypt the imuges using huo dt@erent ~pproorhes. the Elec@onic Codpbook (ECB) mode grid the Ciph;;j-Bi+k Chaining (CBC) mode. We pr? that +be .numerical re*& given ly &U pnqx~~d m+waring technique agree wilh !hare taken by visual impection MdpreviouE results known wore about the &ormame o/ ECB and CBC mds in image enctyption

60 citations

Posted Content
TL;DR: Based on the analysis and the results available in literature regarding the existing weaknesses of RC4, few additional layers over the RC4 KSA and RC4 Pseudo-Random Generation Algorithm (PRGA) are proposed in this paper.
Abstract: In this paper, the RC4 Key Scheduling Algorithm (KSA) is theoretically studied to reveal non-uniformity in the expected number of times each value of the permutation is touched by the indices i, j. Based on our analysis and the results available in literature regarding the existing weaknesses of RC4, few additional layers over the RC4 KSA and RC4 Pseudo-Random Generation Algorithm (PRGA) are proposed. Analysis of the modified cipher (we call it RC4) shows that this new strategy avoids existing weaknesses of RC4.

59 citations

01 Oct 1999
TL;DR: This document proposes the addition of new cipher suites to the TLS protocol to support Kerberos-based authentication.
Abstract: This document proposes the addition of new cipher suites to the TLS protocol [1] to support Kerberos-based authentication. Kerberos credentials are used to achieve mutual authentication and to establish a master secret which is subsequently used to secure client-server communication.

59 citations

Book ChapterDOI
01 Jan 1983
TL;DR: This note describes five regular properties of the ‘Data Encryption Standard’ or DES, two of which have been described elsewhere and are included for completeness.
Abstract: A cipher function y = E(k,x) should appear to be a random function of both the key k and the plaintext x Any regular behaviour is of interest to the users In the extreme case regular properties might point to a weakness of the cipher Precautions are needed in the use of a cipher that has regular features This note describes five regular properties of the ‘Data Encryption Standard’ or DES, two of which have been described elsewhere, are included for completeness

59 citations

Patent
Hirata Shigeaki1
05 Jul 1985
TL;DR: In this article, a pay program signal is scrambled in an exclusive OR circuiit by a scrambling signal (Ks) derived from a random number generator, and the cipher signal (Ei1) is stored in a RAM of a subscriber.
Abstract: A pay program signal is scrambled in an exclusive OR circuiit by a scrambling signal (Ks) derived from a random number generator. The pay program signal is converted into a broadcasting signal by a converter. A transmission information processor alters every month, for example, the contents of an initial value signal applied to the random number generator in order to change a scramble mode. The information processor transmits, via the converter, cipher signal (Ei) for descrambling the pay program signal in, for example, the next month. The cipher signal (Ei1) is stored in a RAM of a subscriber. At this time, a memory area into which the cipher signal (Ei1) is to be stored is designated by a distribution page flag (DP) transmitted from the information processor. The information processor also designates the memory area storing the cipher signal (Ei1), by means of a reference page flag (RF), which is to be used. The key data is used as data to determine a descramble mode of the random number generator.

59 citations


Network Information
Related Topics (5)
Cryptography
37.3K papers, 854.5K citations
90% related
Encryption
98.3K papers, 1.4M citations
89% related
Authentication
74.7K papers, 867.1K citations
85% related
Public-key cryptography
27.2K papers, 547.7K citations
85% related
Key (cryptography)
60.1K papers, 659.3K citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023155
2022309
2021343
2020415
2019509
2018487