2012
DOI: 10.1109/tifs.2012.2204983
|View full text |Cite
|
Sign up to set email alerts
|

Enhancement of Secrecy of Block Ciphered Systems by Deliberate Noise

Abstract: This paper considers the problem of end-to-end security enhancement by resorting to deliberate noise injected in ciphertexts. The main goal is to generate a degraded wiretap channel in the application layer over which Wyner-type secrecy encoding is invoked to deliver additional secure information. More specifically, we study secrecy enhancement of the Data Encryption Standard (DES) block cipher working in cipher feedback model (CFB) when adjustable noise is introduced into the encrypted data in an application … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(22 citation statements)
references
References 32 publications
0
17
0
Order By: Relevance
“…This paper proposed a generic model of randomized encryption schemes, that encompasses those presented in [16], [17], [21], [22], [24], [25] and [30].…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…This paper proposed a generic model of randomized encryption schemes, that encompasses those presented in [16], [17], [21], [22], [24], [25] and [30].…”
Section: Discussionmentioning
confidence: 99%
“…The vector x could be generated by keystream generator or by a block cipher working in the cipher feedback mode (CFB) as in [16], [17], [30] and [31].…”
Section: Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…The system provides cryptographic security enhancement [1]- [2]. The issue of end-to-end security was upgraded by turning to consider disorder infused in ciphertext.…”
Section: Related Workmentioning
confidence: 99%
“…The encrypted code is usually generated by applying a block cipher algorithm on an Msequence, and the resulting output can be considered confidential [14][15][16][17]. In that method, the security is applied by encrypting the spreading code employing a private key.…”
Section: Introductionmentioning
confidence: 99%