scispace - formally typeset
Search or ask a question
Topic

Plaintext-aware encryption

About: Plaintext-aware encryption is a research topic. Over the lifetime, 1980 publications have been published within this topic receiving 101775 citations. The topic is also known as: Plaintext awareness.


Papers
More filters
Proceedings ArticleDOI
15 Dec 2013
TL;DR: In this paper hybrid approach is used for applying encryption algorithms, and proposed algorithm shows significant high Avalanche Effect, as compared with Vigenere Encryption Algorithm.
Abstract: Security is a mechanism by which information is protected from unintended or unauthorized access, change or destruction. To secure such information process of encryption is used. Encryption is the act of transforming sensitive data through an algorithm to make the data unreadable in such a way that only the person (or computer) with the key can have access to it. In this paper hybrid approach is used for applying encryption algorithms. Different kinds of algorithms such as substitution cipher, symmetric algorithm etc are used. The system's security is greatly improved, through researching several famous data encryption algorithms, improving some data encryption algorithms and arranging them in a suitable order. Avalanche Effect is chosen as a metric for measuring performance of proposed algorithm and its implementation. Proposed algorithm shows significant high Avalanche Effect, as compared with Vigenere Encryption Algorithm.

26 citations

Journal Article
TL;DR: In this article, the security of symmetric cryptosystems in the blockwise adversarial model was addressed and a generic technique to thwart blockwise adversaries for a specific class of encryption schemes was proposed.
Abstract: This paper addresses the security of symmetric cryptosystems in the blockwise adversarial model. At Crypto 2002, Joux, Martinet and Valette have proposed a new kind of attackers against several symmetric encryption schemes. In this paper, we first show a generic technique to thwart blockwise adversaries for a specific class of encryption schemes. It consists in delaying the output of the ciphertext block. Then we provide the first security proof for the CFB encryption scheme, which is naturally immune against such attackers.

26 citations

Journal ArticleDOI
TL;DR: Study reveals that Blowfish gives better performance than AES, DES and 3DES in terms of encryption time, decryption time & throughput.
Abstract: Encryption algorithm plays a crucial role in information security which guarantees the recent growing internet and network applications. They are used to secure the data in wireless networks against malicious attacks but securing data also consumes resources such as C.P.U time, Memory, battery power, encryption time etc. In this paper, we evaluated the performance of four symmetric key encryption algorithms; AES, DES, 3DES and Blowfish which commonly used for data encryption in terms of encryption time, decryption time & throughput. In this research, we evaluated encryption time, decryption time and throughput for all four encryption algorithms in Visual Basic’s environment using large size text data (.doc). Experimental results show that Blowfish encryption algorithm may be more suitable for wireless networks. Study reveals that Blowfish gives better performance than AES, DES and 3DES in terms of encryption time, decryption time & throughput.

26 citations

Journal ArticleDOI
TL;DR: This paper analyzes the security of DSEA, and points out the following weaknesses: its security against the brute-force attack was overestimated, it is not sufficiently secure against ciphertext-only attacks, and only one ciphertext is enough to get some information about the plaintext and to break the value of a sub-key.

26 citations

Posted Content
TL;DR: A variation of the standard definition of chosen-ciphertext security is introduced, which is called IND-CCA3, and it is proved that IND- CCA3 is equivalent to authenticated-encryption.
Abstract: In this note we introduce a variation of the standard definition of chosen-ciphertext security, which we call IND-CCA3, and prove that IND-CCA3 is equivalent to authenticated-encryption.

26 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
90% related
Cryptography
37.3K papers, 854.5K citations
89% related
Public-key cryptography
27.2K papers, 547.7K citations
88% related
Hash function
31.5K papers, 538.5K citations
87% related
Key (cryptography)
60.1K papers, 659.3K citations
86% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202318
202230
20211
20202
20194
201822