Cryptography
http://www.mdpi.com/journal/cryptography
Latest open access articles published in Cryptography at http://www.mdpi.com/journal/cryptography<![CDATA[Cryptography, Vol. 1, Pages 5: Privacy in a Digital, Networked World: Technologies, Implications and Solutions. By Sherali Zeadally and Mohamad Badra. Springer International Publishing: 418 pp.; $51.89; ISBN-10: 3319084690, ISBN-13: 978-3319084695]]>
http://www.mdpi.com/2410-387X/1/1/5
n/aCryptography2017-03-1911Book Review10.3390/cryptography101000552410-387X2017-03-19doi: 10.3390/cryptography1010005Nicolas Sklavos<![CDATA[Cryptography, Vol. 1, Pages 4: Cryptography in Wireless Multimedia Sensor Networks: A Survey and Research Directions]]>
http://www.mdpi.com/2410-387X/1/1/4
Wireless multimedia sensor networks will play a central role in the Internet of Things world, providing content-rich information for an uncountable number of monitoring and control scenarios. As more applications rely on multimedia data, security concerns gain attention, and new approaches arise to provide security for such networks. However, the usual resource constraints of processing, memory and the energy of multimedia-based sensors have brought different challenges for data encryption, which have driven the development of different security approaches. In this context, this article presents the state-of-the-art of cryptography in wireless multimedia sensor networks, surveying innovative works in this area and discussing promising research directions.Cryptography2017-01-0511Review10.3390/cryptography101000442410-387X2017-01-05doi: 10.3390/cryptography1010004Daniel CostaSolenir FiguerêdoGledson Oliveira<![CDATA[Cryptography, Vol. 1, Pages 3: A Privacy-Preserving, Mutual PUF-Based Authentication Protocol]]>
http://www.mdpi.com/2410-387X/1/1/3
This paper describes an authentication protocol using a Hardware-Embedded Delay PUF called HELP. HELP derives randomness from within-die path delay variations that occur along the paths within a hardware implementation of a cryptographic primitive, such as AES or SHA-3. The digitized timing values which represent the path delays are stored in a database on a secure server (verifier) as an alternative to storing PUF response bitstrings. This enables the development of an efficient authentication protocol that provides both privacy and mutual authentication. The security properties of the protocol are analyzed using data collected from a set of Xilinx Zynq FPGAs.Cryptography2016-11-2511Article10.3390/cryptography101000332410-387X2016-11-25doi: 10.3390/cryptography1010003Wenjie CheMitchell MartinGoutham PocklasseryVenkata KajuluriFareena SaqibJim Plusquellic<![CDATA[Cryptography, Vol. 1, Pages 2: Balanced Permutations Even–Mansour Ciphers]]>
http://www.mdpi.com/2410-387X/1/1/2
The r-rounds Even–Mansour block cipher is a generalization of the well known Even–Mansour block cipher to r iterations. Attacks on this construction were described by Nikolić et al. and Dinur et al. for r = 2 , 3 . These attacks are only marginally better than brute force but are based on an interesting observation (due to Nikolić et al.): for a “typical” permutation P, the distribution of P ( x ) ⊕ x is not uniform. This naturally raises the following question. Let us call permutations for which the distribution of P ( x ) ⊕ x is uniformly “balanced” — is there a sufficiently large family of balanced permutations, and what is the security of the resulting Even–Mansour block cipher? We show how to generate families of balanced permutations from the Luby–Rackoff construction and use them to define a 2 n -bit block cipher from the 2-round Even–Mansour scheme. We prove that this cipher is indistinguishable from a random permutation of { 0 , 1 } 2 n , for any adversary who has oracle access to the public permutations and to an encryption/decryption oracle, as long as the number of queries is o ( 2 n / 2 ) . As a practical example, we discuss the properties and the performance of a 256-bit block cipher that is based on our construction, and uses the Advanced Encryption Standard (AES), with a fixed key, as the public permutation.Cryptography2016-04-0111Article10.3390/cryptography101000222410-387X2016-04-01doi: 10.3390/cryptography1010002Shoni GilboaShay GueronMridul Nandi<![CDATA[Cryptography, Vol. 1, Pages 1: Cryptography: A New Open Access Journal]]>
http://www.mdpi.com/2410-387X/1/1/1
Cryptography has very long history, from ancient ciphers, such as Ceaser cipher, machine (or rotor) cipherx during WWI and WWII, and modern ciphers, which play a fundamental role in providing Confidentiality, Integrity, and Authentication services during transmission, processing, and storage of the sensitive data over the open or public networks. [...]Cryptography2016-02-1511Editorial10.3390/cryptography101000112410-387X2016-02-15doi: 10.3390/cryptography1010001Kwangjo Kim