block-cipher

  1. Using an Even-Mansour block cipher in a tweakable mode of operation

  2. Can one claim that AES is a perfect cipher?

  3. Upper bound of this derivative of counter mode?

  4. In what way is KeeLoq a block cipher?

  5. Avalanche effect in DES

  6. KeeLoq showing that decryption is indeed the inverse of encryption?

  7. How is the Lai-Massey scheme invertible?

  8. What if we increase the key length of DES and use ECB Mode, then will we get the different output as ECB mode encrypt with the same key?
  9. Cryptanalysis on block cipher (What is exactly a zero correlation attack?)

  10. Are there any security flaws in using an involutive S-box?

  11. How to apply Lagrange interpolation to create AES S-box using Sage

  12. Identification of Confusion Component in a Cipher
  13. What is the "standard model" for block ciphers?
  14. AES: How to create the S-box with Sage

  15. Cipher Block Chaining

  16. Message lengths with AES CTR mode?

  17. deterministic random number generator based on block ciphers

  18. Security of a parallelizable block cipher mode

  19. Block cipher's output in case of uniformly drawn input

  20. What is the difference between key size and block size (for AES)?
  21. Most secure 32-bit block cipher
  22. How can I identify the linear equations for a block cipher with 4 different s-boxes?
  23. What are the relations between cryptanalysis of block ciphers such as AES and Kendall's tau coefficient?
  24. A Construction of a Cipher from a Single Pseudorandom Permutation
  25. Feistel cipher key generation and round function algorithms
  26. Is ciphertext stealing important in relation to Blowfish?

  27. Crypto algorithm identification (reverse engineering)
  28. Common Crypto C api: Why both CCCryptorUpdate() and CCCryptorFinal()?

  29. reducing computation of branch number?

  30. Is the nonce in GCM mode used as key for HMAC? And how to send it?

  31. Attacking AES without transposition using ShiftRow and Mixcolumn layers

  32. Using Hadamard Form of a Matrix in the Block Cipher
  33. CPA security of CTR with a predictable IV
  34. AES-encrypted 128-bit null block: lookup table?

  35. active s-boxes of 5 rounds of Fides AE cipher

  36. What's the difference between block ciphers and symmetric-key encryption?
  37. Why is AES resistant to known-plaintext attacks?

  38. Cracking a key using a combination of partial keys

  39. Which element produces randomness in symmetric block ciphers encryption

  40. Security of GCM if Implemented with Stream Cipher instead of Block Cipher
  41. Block Chain Decryption

  42. Crafting secure block ciphers that lack key expansion
  43. what is s meant by s box row and column in DES?
  44. AES key expansion for 192-bit

  45. Block Ciphers / Kerckhoffs Principle

  46. What are recommended, general strategies to start block-cipher design and/or analysis?

  47. Why is multiplication uncommon in cryptographic primitives?
  48. Can Java Decrypt a 4-byte MIC?

  49. Alternative block cipher design paradigms to SP-networks and Feistel-like ones?

  50. Robust stream cipher using AES encryption block

  51. Arbitrary length to multiple of block size

  52. Java - AES with 20 byte packet
  53. Desirability of chaining an LCG in an authentication scheme
  54. Perfect secrecy of block ciphers

  55. Weaknesses in ARX block ciphers
  56. AES Key Length vs Block Length

  57. How to perform the padding oracle attack on AES CBC?
  58. Security of this parallelizable two-pass authentication scheme

  59. How does "one-pass" authentication differ from "two-pass"?

  60. Is the CBC mode of operation a stream cipher mode?

  61. Confusion and Diffusion in the AES functions
  62. Classify a (block) cipher
  63. compact hardware implementation of inversion based 8-bit s-boxes
  64. How can AES-like block cipher without non-linear component be broken?
  65. Are Two Ciphers Better Than One? i.e. RC4 and AES

  66. Does key-length recommendation provided by NIST consider quantum computer?
  67. How to build disk encryption system using forward permutations like Gimli?

  68. Is it possible to construct a $3*3$ MDS matrix in $GF(2^4)$?

  69. In a Feistel cipher structure, what exactly does the "round function $F$" do?

  70. What does it mean when 1 bit goes into an s-box but two (or more) come out?

  71. does cipher code can be use with number?

  72. Why can't we give block ciphers larger keys?
  73. is DES Faster Than AES on software
  74. How does the PRESENT cipher's permutation affect all rounds when it repeats after every three rounds?
  75. Triple DES: Does knowing the plaintext limit my keyspace for brute force?

  76. How is Twofish flattening the result of Reed-Solomon MDS matrix multiplication into a 32-bit result?

  77. Recover key given partial key, IV and cipher text using CBC mode
  78. Using variable length CBC-MAC, can some block cipher with a fixed k be used as a cryptographic hash function?
  79. RIsk mitigation: block cypher vs xor
  80. The purpose of ADATA in GCM

  81. How to find keylength and use arbitrary length messages at the same time when decrypting ECB one byte at a time

  82. How can I create a block cipher of a reduced size given a fixed length block cipher?

  83. Muchomor cipher

  84. Is there a construction for a variable length block cipher that uses a fixed length one?

  85. Elliptic curve cryptography for encrypting audio
  86. Effective security of block cipher – equal the key size, or half the key size?
  87. Is there a block cipher mode that doesn't use the key input of the block cipher?
  88. Could a larger block size increase the security of the block cipher?

  89. Is this an acceptable way to increase the block size of a block cipher?

  90. What is a wide block cipher and why does it avoid birthday bound problems?

  91. The input parameters of AES encryption / decryption
  92. What are the qualities of a good block cipher? Begginner, Intermediate, Advanced, Expert

  93. How long does it take to crack DES and AES?

  94. Are there any online, single pass, AE with associated data auth?

  95. Why do we need key scheduling?

  96. What is the difference between lightweight tweakable block cipher and tweakable block cipher?

  97. How secure is this block cipher?

  98. How to calculate initial RC5 encryption parameters?
  99. Difference between stream cipher and block cipher
  100. Why do we need to go through multiple cycles in block cipher