2022
DOI: 10.1007/s12652-022-04379-7
|View full text |Cite
|
Sign up to set email alerts
|

DeCrypt: a 3DES inspired optimised cryptographic algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 22 publications
0
9
0
Order By: Relevance
“…Consider the remaining tapping bits of REG3, i.e., REG3 [20] and REG3 [7]. At the time of initialization, for each bit position, we make two replicas and each one is initialized by both possibilities (0 and 1).…”
Section: Proposed Attackmentioning
confidence: 99%
See 4 more Smart Citations
“…Consider the remaining tapping bits of REG3, i.e., REG3 [20] and REG3 [7]. At the time of initialization, for each bit position, we make two replicas and each one is initialized by both possibilities (0 and 1).…”
Section: Proposed Attackmentioning
confidence: 99%
“…For instance, REG3 is clocked just after initialization of REG1. As a result, bits of register REG3 are shifted downwards, i.e., REG3 [22], REG3 [21], REG3 [11], and REG3 [8] are assigned known value of REG3 [21], REG3 [20], REG3 [10], and REG3 [7], respectively, and the XORing result of feedback polynomial is set to REG3[0]. In this way, REG3[0], REG3 [8], and REG3 [11] become known and REG3 [7], REG3 [10], and REG3 [20] become unknown and the remaining positions of REG3 remain unknown since downwards shifting is done by an unknown value.…”
Section: Proposed Attackmentioning
confidence: 99%
See 3 more Smart Citations