Corpus ID: 15337175

Cryptanalysis of Modern Cryptographic Algorithms

@inproceedings{BahadurCryptanalysisOM,
  title={Cryptanalysis of Modern Cryptographic Algorithms},
  author={Guru Tegh Bahadur}
}
Cryptography-a word with Greek origin mean " secret writing ". It refers to the science and art of transforming messages to make them secure and immune to attacks. Research on cryptography is still in its developing stages and considerable research effort is required. This paper is devoted to the security and attack aspects of cryptographic techniques. I have discussed the dominant issues of security and various attacks. Finally, I have benchmarked some well-known modern cryptographic… Expand

Figures and Tables from this paper

Evolution of an Emerging Symmetric Quantum Cryptographic Algorithm
TLDR
A new emerging trend of modern symmetric encryption algorithm by development of the advanced encryption standard (AES) algorithm is presented, which is abbreviated as Quantum-AES (QAES), and exploits the specific selected secret key generated from the QKD cipher using two different modes (online and off-line). Expand
Innovative Method for enhancing Key generation and management in the AES-algorithm
TLDR
The development of the advanced encryption standard (AES) algorithm is presented, which is considered as the most eminent symmetric encryption algorithm, and the specific selected secret key generated from the quantum key distribution is presented. Expand
Advanced encryption standard development based quantum key distribution
TLDR
This paper presents a development of the advanced encryption standard (AES) algorithm, which is considered as the most important symmetric encryption algorithm, and introduces the integration between the developed AES based DQS-Boxes, and the specific selected secret key generated from the QKD using two different modes. Expand
A New ShiftColumn Transformation: An Enhancement of Rijndael Key Scheduling
TLDR
The proposed approach, called ShiftColumn, operates by shifting bit and the result will be shifted with different offsets, which improves the security of the original Rijndael key scheduling, by enhancing the bit confusion and diffusion of the subkey, which is output that is produced from the key schedule transformation. Expand

References

SHOWING 1-10 OF 13 REFERENCES
A primer on cryptography in communications
TLDR
The development of unbreakable cipher keys, cipher-key distribution, identification of malicious actors, source authentication, physical-link signature identification, countermeasures, and so forth has been the major thrust of research efforts with regard to cyber-security. Expand
An Implementation of DES and AES, Secure against Some Attacks
TLDR
This paper introduces some transformed S-boxes for DES and a new masking method and its applications to the non-linear part of Rijndael and applies this method to protect two of the most popular block ciphers: DES and the AES RIJndael. Expand
Handbook of Applied Cryptography
From the Publisher: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access ofExpand
Applied cryptography: Protocols, algorithms, and source code in C
TLDR
This is Applied Cryptography Protocols Algorithms And Source Code In C Applied Cryptographic Protocols algorithms and Source Code in C By Schneier Bruce Author Nov 01 1995 the best ebook that you can get right now online. Expand
Comments on the Security of the AES and the XSL Technique
TLDR
This note gives some background information relevant to recent claims of key recovery attacks on the AES, as well as highlighting the importance of knowing the architecture itself to protect against future attacks. Expand
Basic security measures for IEEE 802.11 wireless networks
TLDR
Un discusion tutorial de tres estandares de seguridad de uso comun en las redes inalambri-cas IEEE 802.11: WEP, WPA y WPA2, para facilitar su comprension a nivel academico. Expand
Cryptography & Network Security BA Forouzan -2007 portal .acm
  • Cryptography & Network Security BA Forouzan -2007 portal .acm
The Mathematical Ideas behind Modern Cryptography
  • The Mathematical Ideas behind Modern Cryptography
  • 2000
Handbook of applied cryptography scientificcommons.org AJ Menezes
  • Handbook of applied cryptography scientificcommons.org AJ Menezes
  • 1997
...
1
2
...