Throughout history, spies, soldiers, and others have relied on so-called {\em hand ciphers} to send encrypted messages. Since the creation of Pontifex (also known as Solitaire) by Bruce Schneier in 1999, a number of hand ciphers utilizing a standard deck of playing cards have emerged. Since there are $52! \approx 2^{225.58}$ possible ways to order a deck of cards, there are over 225 bits of entropy in a well-shuffled deck of cards. Theoretically, this can provide enough security to rival modern computer-based cryptosystems. In this paper, we describe and analyze one such playing card cipher, Card-Chameleon, created by Matthew McKague. Our analysis reveals new weaknesses in this cryptosystem, particularly the tendency for a letter to encrypt...
The cryptography is a means to defend some secrets. It is necessary to endure enough for the attack....
Cryptography is a stimulating way to introduce and consolidate ideas in statistics, computational li...
Several generalizations of linear cryptanalysis have been proposed in the past, as well as very simi...
Before computers, military tacticians and government agents had to rely on pencil-and-paper methods ...
Public key cryptography bases its security on mathematical problems that are computation-ally hard t...
We examine some historical proto-mechanical cryptographic devices, such as the Wheatstone Cryptograp...
ChaCha has been one of the prominent ARX designs of the last few years because of its use in several...
We live in an age where we willingly provide our social security number, credit card information, ho...
National audienceIt is crucial for a cipher to be trusted that its design be wellexplained. However,...
Sharing of information in a secured manner is extremely essential in this world of internet technolo...
Ciphers have been used throughout history to keep information secret [3]. Text ciphers work by apply...
HIGHT is a 32-round block cipher with a 64-bit block size and a 128-bit user key, which was proposed...
We live in an age when our most private information is becoming exceedingly difficult to keep privat...
In 2003, Zhao, Varadharajan and Mu proposed a mental poker protocol whose security was shown to be f...
Pattern-loaded ciphers are at risk of being compromised by exploiting deeper patterns discovered fir...
The cryptography is a means to defend some secrets. It is necessary to endure enough for the attack....
Cryptography is a stimulating way to introduce and consolidate ideas in statistics, computational li...
Several generalizations of linear cryptanalysis have been proposed in the past, as well as very simi...
Before computers, military tacticians and government agents had to rely on pencil-and-paper methods ...
Public key cryptography bases its security on mathematical problems that are computation-ally hard t...
We examine some historical proto-mechanical cryptographic devices, such as the Wheatstone Cryptograp...
ChaCha has been one of the prominent ARX designs of the last few years because of its use in several...
We live in an age where we willingly provide our social security number, credit card information, ho...
National audienceIt is crucial for a cipher to be trusted that its design be wellexplained. However,...
Sharing of information in a secured manner is extremely essential in this world of internet technolo...
Ciphers have been used throughout history to keep information secret [3]. Text ciphers work by apply...
HIGHT is a 32-round block cipher with a 64-bit block size and a 128-bit user key, which was proposed...
We live in an age when our most private information is becoming exceedingly difficult to keep privat...
In 2003, Zhao, Varadharajan and Mu proposed a mental poker protocol whose security was shown to be f...
Pattern-loaded ciphers are at risk of being compromised by exploiting deeper patterns discovered fir...
The cryptography is a means to defend some secrets. It is necessary to endure enough for the attack....
Cryptography is a stimulating way to introduce and consolidate ideas in statistics, computational li...
Several generalizations of linear cryptanalysis have been proposed in the past, as well as very simi...