scispace - formally typeset
Search or ask a question
Topic

Cipher

About: Cipher is a research topic. Over the lifetime, 9409 publications have been published within this topic receiving 110309 citations. The topic is also known as: cypher & cryptographic algorithm.


Papers
More filters
Proceedings ArticleDOI
25 Oct 2008
TL;DR: This method enforces global constraints using integer programming, and it guarantees that no decipherment key is overlooked, and an empirical investigation of Shannon's (1949) theory of uncertainty in decipherment is made.
Abstract: We introduce a method for solving substitution ciphers using low-order letter n-gram models. This method enforces global constraints using integer programming, and it guarantees that no decipherment key is overlooked. We carry out extensive empirical experiments showing how decipherment accuracy varies as a function of cipher length and n-gram order. We also make an empirical investigation of Shannon's (1949) theory of uncertainty in decipherment.

48 citations

Journal ArticleDOI
TL;DR: Results demonstrate that number of resources and measured power consumption exhibit similar, but not identical, profile against design options, and employing variable key scheduling increases resources, power and energy by 30%, 42% and 58%, respectively.

48 citations

Journal ArticleDOI
TL;DR: A secure image transmission scheme based on synchronization of fractional-order discrete-time hyperchaotic systems is proposed, which can resist different kinds of attacks and it exhibits good performance.
Abstract: In this paper, a secure image transmission scheme based on synchronization of fractional-order discrete-time hyperchaotic systems is proposed. In this scheme, a fractional-order modified-Henon map is considered as a transmitter, the system parameters and fractional orders are considered as secret keys. As a receiver, a step-by-step delayed observer is used, and based on this one, an exact synchronization is established. To make the transmission scheme secure, an encryption function is used to cipher the original information using a key stream obtained from the chaotic map sequences. Moreover, to further enhance the scheme security, the ciphered information is inserted by inclusion method in the chaotic map dynamics. The first contribution of this paper is to propose new results on the observability and the observability matching condition of nonlinear discrete-time fractional-order systems. To the best of our knowledge, these features have not been addressed in the literature. In the second contribution, the design of delayed discrete observer, based on fractional-order discrete-time hyperchaotic system, is proposed. The feasibility of this realization is demonstrated. Finally, different analysis are introduced to test the proposed scheme security. Simulation results are presented to highlight the performances of our method. These results show that, our scheme can resist different kinds of attacks and it exhibits good performance.

48 citations

Journal ArticleDOI
TL;DR: Encryption-based methods are utilized to protect participants’ privacy information in unsecured network channels for dynamic and real-time sensing tasks to effectively solve the problem of poor network latency and improve the privacy protection level of IoT.
Abstract: In the participatory sensing framework, privacy protection of the Internet of Things (IoT) is very important. In this article, cryptography-based methods are utilized to protect participants’ privacy information in unsecured network channels for dynamic and real-time sensing tasks. The edge computing paradigm is introduced in the traditional participatory sensing framework to reduce network latency. Then, the Rivest Cipher 4 stream cipher and logistic mapping are combined to deal with the problems of participants’ limited resources and untruthful third-party platforms. Finally, the product algebra and logistic mapping are combined to deal with the problems of large numbers of participants’ access and poor randomness of keystream. Through extensive performance evaluation and comparison experiments on the real-world data, the effectiveness and adaptation of the proposed privacy protection based on stream cipher are verified. It could effectively solve the problem of poor network latency and improve the privacy protection level of IoT.

48 citations

Journal ArticleDOI
TL;DR: The theoretical analysis and experimental results show that the algorithm improves the encoding efficiency, enhances the security of the ciphertext, has a large key space and a high key sensitivity, and is able to resist against the statistical and exhaustive attacks.
Abstract: In this paper, we propose a novel medical image encryption algorithm based on a hybrid model of deoxyribonucleic acid (DNA) masking, a Secure Hash Algorithm SHA-2 and a new hybrid chaotic map. Our study uses DNA sequences and operations and the chaotic hybrid map to strengthen the cryptosystem. The significant advantages of this approach consist in improving the information entropy which is the most important feature of randomness, resisting against various typical attacks and getting good experimental results. The theoretical analysis and experimental results show that the algorithm improves the encoding efficiency, enhances the security of the ciphertext, has a large key space and a high key sensitivity, and is able to resist against the statistical and exhaustive attacks.

48 citations


Network Information
Related Topics (5)
Cryptography
37.3K papers, 854.5K citations
90% related
Encryption
98.3K papers, 1.4M citations
89% related
Authentication
74.7K papers, 867.1K citations
85% related
Public-key cryptography
27.2K papers, 547.7K citations
85% related
Key (cryptography)
60.1K papers, 659.3K citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023155
2022309
2021343
2020415
2019509
2018487