{"title":"位筛/像素筛方法的加密密钥问题及解决方案","authors":"I. Árpád","doi":"10.1109/AQTR.2014.6857853","DOIUrl":null,"url":null,"abstract":"During the testing and analysis for robustness of pixel sieve and bit sieve cryptographic methods few weaknesses emerged. Some of them are related to the cryptographic key itself. Not any kind of key is secure to use for encryption. Some serious restrictions regarding the keys are reducing the number of usable keys in a given keys-pace. On one issue for a key length of n only n/3 keys are safe to use and those keys ar also subject for restrictions. Within this paper thees weaknesses will be shown among with some proposed solutions. The solutions found are using techniques like: key expansion, XORing, circular permutation and key shifting. With the solutions presented here some of the key related issues are solved increasing the robustness and security of the method.","PeriodicalId":297141,"journal":{"name":"2014 IEEE International Conference on Automation, Quality and Testing, Robotics","volume":"1993 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Cryptographic key issues and solutions for the bit sieve/pixel-sieve method\",\"authors\":\"I. Árpád\",\"doi\":\"10.1109/AQTR.2014.6857853\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"During the testing and analysis for robustness of pixel sieve and bit sieve cryptographic methods few weaknesses emerged. Some of them are related to the cryptographic key itself. Not any kind of key is secure to use for encryption. Some serious restrictions regarding the keys are reducing the number of usable keys in a given keys-pace. On one issue for a key length of n only n/3 keys are safe to use and those keys ar also subject for restrictions. Within this paper thees weaknesses will be shown among with some proposed solutions. The solutions found are using techniques like: key expansion, XORing, circular permutation and key shifting. With the solutions presented here some of the key related issues are solved increasing the robustness and security of the method.\",\"PeriodicalId\":297141,\"journal\":{\"name\":\"2014 IEEE International Conference on Automation, Quality and Testing, Robotics\",\"volume\":\"1993 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-05-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE International Conference on Automation, Quality and Testing, Robotics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AQTR.2014.6857853\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE International Conference on Automation, Quality and Testing, Robotics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AQTR.2014.6857853","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cryptographic key issues and solutions for the bit sieve/pixel-sieve method
During the testing and analysis for robustness of pixel sieve and bit sieve cryptographic methods few weaknesses emerged. Some of them are related to the cryptographic key itself. Not any kind of key is secure to use for encryption. Some serious restrictions regarding the keys are reducing the number of usable keys in a given keys-pace. On one issue for a key length of n only n/3 keys are safe to use and those keys ar also subject for restrictions. Within this paper thees weaknesses will be shown among with some proposed solutions. The solutions found are using techniques like: key expansion, XORing, circular permutation and key shifting. With the solutions presented here some of the key related issues are solved increasing the robustness and security of the method.