ML p(r)ior | Quantitative Evaluation of Chaotic CBC Mode of Operation

Quantitative Evaluation of Chaotic CBC Mode of Operation

2016-01-29
The cipher block chaining (CBC) block cipher mode of operation presents a very popular way of encrypting which is used in various applications. In previous research work, we have mathematically proven that, under some conditions, this mode of operation can admit a chaotic behavior according to Devaney. Proving that CBC mode is chaotic is only the beginning of the study of its security. The next step, which is the purpose of this paper, is to develop the quantitative study of the chaotic CBC mode of operation by evaluating the level of sensibility and expansivity for this mode.
PDF

Highlights - Most important sentences from the article

Login to like/save this paper, take notes and configure your recommendations

Related Articles

2019-03-08

The last years of the 20 th century and the beginning of the 21 th mark the facilitation trend of ou… show more
PDF

Highlights - Most important sentences from the article

2019-02-14
1902.05234 | cs.DC

It has been widely accepted that Graphics Processing Units (GPU) is one of promising schemes for enc… show more
PDF

Highlights - Most important sentences from the article

2019-01-26
1901.09281 | cs.CR

Privacy-preserving machine learning is learning from sensitive datasets that are typically distribut… show more
PDF

Highlights - Most important sentences from the article

2019-01-23

Rivest's seminal paper introduced the first All-Or-Nothing (AON) method transforming input data into… show more
PDF

Highlights - Most important sentences from the article

2018-03-27

Recently, a chaotic image encryption algorithm based on information entropy (IEAIE) was proposed. Th… show more
PDF

Highlights - Most important sentences from the article

2018-10-10
1810.06333 | cs.CR

In this paper, we provide some safe ways to transfer images securely by using cryptography and stega… show more
PDF

Highlights - Most important sentences from the article

2019-03-14
1903.06267 | math.CO

In this paper we present an algorithm to compute keyed hash function (message authentication code MA… show more
PDF

Highlights - Most important sentences from the article

2018-09-26

Would you like to have your own cryptography method? Experts say you should not do it. If you think … show more
PDF

Highlights - Most important sentences from the article

2017-12-30

We address the problem of simulating an arbitrary binary interactive first-order Markovian protocol … show more
PDF

Highlights - Most important sentences from the article

2014-01-15
1401.3592 | cs.NE

This thesis aims to use intelligent systems to extend and improve performance and security of crypto… show more
PDF

Highlights - Most important sentences from the article

2016-08-21

Lots of researches indicate that the inefficient generation of random numbers is a significant bottl… show more
PDF

Highlights - Most important sentences from the article

2017-08-20
1708.05970 | cs.MM

In this paper, a data hiding scheme ready for Internet applications is proposed. An existing scheme … show more
PDF

Highlights - Most important sentences from the article

2012-03-03

In our previous researches, a new digital watermarking scheme based on chaotic iterations has been i… show more
PDF

Highlights - Most important sentences from the article

2015-12-18
1512.05864 | cs.DC

This paper focuses on parallel hash functions based on tree modes of operation for an inner Variable… show more
PDF

Highlights - Most important sentences from the article

2016-07-01
1607.00307 | cs.DC

A recent work shows how we can optimize a tree based mode of operation for a hash function where the… show more
PDF

Highlights - Most important sentences from the article

2017-06-25

Sub-categories of mathematical topology, like the mathematical theory of chaos, offer interesting ap… show more
PDF

Highlights - Most important sentences from the article