permutation-based cryptographyAESSummary: We propose a new authenticated encryption scheme PAEQ, which employs a fixed public permutation. In contrast to the recent sponge-based proposals, our scheme is fully p
permutation翻译 permutation翻译基本解释 ●permutation:排列,置换
It is well known that in cryptography the quality of random numbers directly determines the security strength of the system. Functions for randomness extraction have hidden states, so that repeated calls to the function generate new numbers that appear randomly. If the state is known, all future ...
In Rogaway’s security formalism of nonce-based encryption [26,27], the nonce is considered to be unique for every evaluation. While this approach has theoretical merits, in practice it is challenging to ensure that a nonce is never reused. This is especially the case in lightweight cryptogra...
Computer Science - Cryptography and SecurityIn a system that performs both encryption and lossy compression, the conventional way is to compress first and then encrypt the compressed data. This separation approach proves to be optimal. In certain applications where sensitive information should be ...
Permutation Operations: Permutations in the context of QPP refer to rearranging the ways to transform/interpret the plaintext comparing to rearranging the keys round and round in classical cryptography. These total permutations can be thought of as P n . For a 8-bit byte, the overall permutations...
In this paper, we have developed a block cipher by using the elements of cryptography, namely, permutation, substitution, and iteration. These three ideas cause confusion and diffusion effectively. In this, the plain text is represented as a matrix 28x7 in size containing binary bits. We ...
Cryptography 2024, 8(3), 41; https://doi.org/10.3390/cryptography8030041 Submission received: 4 July 2024 / Revised: 31 August 2024 / Accepted: 4 September 2024 / Published: 11 September 2024 (This article belongs to the Special Issue Advances in Authentication, Authorization and Privacy for ...
Permutation polynomials over finite fields play important roles in finite fields theory. They also have wide applications in coding theory, cryptography, combinational design, communication theory and so on. The study of permutation polynomial can date back to Hermite [16] and Dickson [11]. There ...
In symmetric cryptography, the encryption key is the same as the decryption key. The key must kept secret. Liu et al. proposed colour image encryption based on AES with two dimensional chaotic maps [4]. Salim Muhsin Wadi proposed the high-definition image encryption algorithm based on AES [5...