Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ Dokumentenrepositori...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
https://dx.doi.org/10.13154/29...
Doctoral thesis . 2025
Data sources: Datacite
versions View all 2 versions
addClaim

This Research product is the result of merged Research products in OpenAIRE.

You have already added 0 works in your ORCID record related to the merged Research product.

Symmetric cryptography in the real world

Authors: Stennes, Lukas;

Symmetric cryptography in the real world

Abstract

Die symmetrische Kryptografie hat in den vergangenen hundert Jahren einen großen Sprung nach vorn gemacht. Rotormaschinen sind ins Museum gewandert, und der Advanced Encryption Standard, der AES, schützt jeden Tag Milliarden von Nachrichten. Obwohl dies eine bemerkenswerte Leistung ist, ist noch nicht alles perfekt. In Anbetracht dessen entwickeln wir den Stand der Technik wie folgt weiter: 1) Wir zeigen fatale Schwächen in HALFLOOP-24, einer Chiffre, die vom US-Militär und der NATO verwendet wird. 2) Wir etablieren Methoden, um die Existenz von perfekten linearen Approximationen und Differenzialen über zwei Runden eines Substitution-Permutation-Netzwerks auszuschließen. 3) Wir entwickeln HAWKEYE, ein Werkzeug, das automatisch symmetrische Kryptografie aus Hardwarebeschreibungen rekonstruiert. 4) Wir entwerfen ChiLow, eine Chiffre für die Verschlüsselung von eingebettetem Code, d. h. für ein Szenario, in dem eine extrem niedrige Latenzzeit erforderlich ist.

Related Organizations
Keywords

Sicherheit, ddc:004, Chiffrierung, Kryptoanalyse, Kryptologie, Blockchiffre, 004 Informatik

  • BIP!
    Impact byBIP!
    citations
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
citations
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average