In this paper, we study the effects of channel errors on security and decoding error probability of three encryption systems where encrypted message is sent and eavesdropped over binary symmetric channels (BSC). The three systems are all based on Data Encryption Standard (DES) in cipher feedback (CFB) mode. They are DES only (DC), DES concatenated with Reed Solomon encoding (DCRS), and DES concatenated with RS coding and S-box diffusion (DCRSS). We adopt linear cryptanalysis to quantitatively measure the effects of channel errors on the security of these systems. We have found the required known cipher-plain text pairs in each system for linear attack launched by Eve, an eavesdropper. In addition, performance analysis in terms of decoded in...
Despite the fact that we evidently have very good block ciphers at hand today, some fundamental ques...
In this paper, we give a general framework for the analysis of block ciphers using the statistical ...
Block ciphers are widely used building blocks for secure communication systems; their purpose is to...
It is well known that avalanche effect errors in received noisy ciphertexts will cause severe error ...
In the presence of channel errors, the error pattern in decrypted plaintexts in block-ciphered syste...
This thesis analyses the effect of encrypting data on the bit error rate at the receiver. Block and ...
In this paper we propose an encoding-encryption approach to take advantage of intentional noise intr...
In this paper, we provide secrecy metrics applicable to physical-layer coding techniques with finite...
Ahlswede R, Dueck G. Bad codes are good ciphers. Problems of Control and Information Theory. 1982;11...
In this paper, we examine the problem of error propagation in various cipher block modes. We analyze...
Abstract. Side-channel cube attacks are a class of leakage attacks on block ciphers in which the att...
Abstract—This paper considers the problem of end-end se-curity enhancement by resorting to deliberat...
This paper considers the problem of end-to-end security enhancement by resorting to deliberate noise...
Due to the channel estimation error, most of the physical layer secret key generation schemes need i...
Encryption is a vital process to ensure the confidentiality of the information transmitted over an i...
Despite the fact that we evidently have very good block ciphers at hand today, some fundamental ques...
In this paper, we give a general framework for the analysis of block ciphers using the statistical ...
Block ciphers are widely used building blocks for secure communication systems; their purpose is to...
It is well known that avalanche effect errors in received noisy ciphertexts will cause severe error ...
In the presence of channel errors, the error pattern in decrypted plaintexts in block-ciphered syste...
This thesis analyses the effect of encrypting data on the bit error rate at the receiver. Block and ...
In this paper we propose an encoding-encryption approach to take advantage of intentional noise intr...
In this paper, we provide secrecy metrics applicable to physical-layer coding techniques with finite...
Ahlswede R, Dueck G. Bad codes are good ciphers. Problems of Control and Information Theory. 1982;11...
In this paper, we examine the problem of error propagation in various cipher block modes. We analyze...
Abstract. Side-channel cube attacks are a class of leakage attacks on block ciphers in which the att...
Abstract—This paper considers the problem of end-end se-curity enhancement by resorting to deliberat...
This paper considers the problem of end-to-end security enhancement by resorting to deliberate noise...
Due to the channel estimation error, most of the physical layer secret key generation schemes need i...
Encryption is a vital process to ensure the confidentiality of the information transmitted over an i...
Despite the fact that we evidently have very good block ciphers at hand today, some fundamental ques...
In this paper, we give a general framework for the analysis of block ciphers using the statistical ...
Block ciphers are widely used building blocks for secure communication systems; their purpose is to...