Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Past year
  • Any time
  • Past hour
  • Past 24 hours
  • Past week
  • Past month
  • Past year
All results
Jan 26, 2024 · DES-X (or DESX) is a variant on the DES (Data Encryption Standard) symmetric-key block cipher intended to increase the complexity of a brute-force attack.
May 2, 2024 · How to Protect DES Against Exhaustive Key Search (an Analysis of DESX). J. Cryptol. 14(1): 17-35 (2001). [c28]. view. electronic edition via DOI · unpaywalled ...
Dec 4, 2023 · Kilian J and Rogaway P How to protect DES against exhaustive key search (an analysis of DESX) J. Cryptol. 2001 14 1 17-35. Digital Library · Google Scholar. [27].
Aug 18, 2024 · ... key bits. By adding just two XOR operations, DESX has an effective keylength of 120 bits against an exhaustive key-search attack. As it happens, DESX is no ...
Nov 14, 2023 · Advanced slide attacks have been found to be effective in breaking DESX algorithm. Blowfish Canni`ere (2005) is a similar and relatively secure algorithm that ...
Nov 21, 2023 · We propose a new one-way function, dubbed AIM, as an MPCitH-friendly symmetric primitive with high resistance to algebraic attacks.
Dec 4, 2023 · For a long time, symmetric primitives were believed easy to protect against quantum adversaries, by simply doubling the key length. As Grover's algorithm ...
Dec 22, 2023 · A A minimum key size of 256 bits is necessary for security. B Both algorithm and key should be kept secret. C A minimum of 15 rounds is needed for a Feistel ...
May 21, 2024 · The vulnerability exploits the Argo CD server's elevated permissions, creating an attack vector for malicious actors to escalate their privileges.
Aug 15, 2024 · Learn about Dynamic Environment Manager. This guide provides a discussion of the product and offers practical exercises to set up.