Arama Sonuçları

Listeleniyor 1 - 4 / 4
  • Yayın
    Kaotik kriptografinin çilesi
    (IEEE, 2013-06-13) Solak, Ercan
    Son yirmi yıldır araştırılan bir konu olmasına rağmen, kaotik kriptografi ana akım kriptografi literatüründe yer almıyor. Bu makalede, bu ayrımın nedenleri üzerinde durulmuştur.
  • Yayın
    Cryptanalysis of image encryption with compound chaotic sequence
    (IEEE, 2009) Solak, Ercan
    Recently, an image encryption algorithm based on compound chaotic sequence was proposed [Tong et al., Image and Vision Computing 26 (2008) 843]. In this paper, we analyze the security weaknesses of the proposal. We give chosen-plaintext and known-plaintext attacks that yield the secret parameters of the algoritm. Our simulation results show that the computational complexity of the attacks is quite low.
  • Yayın
    Design of a key exchange protocol between SIM card and service provider
    (Institute of Electrical and Electronics Engineers Inc., 2015-11-05) Ok, Kerem; Coşkun, Vedat; Çevikbaş, Cem; Özdenizci Köse, Büşra
    Current capabilities of smart cards, Smartphones, and cellular network provoke companies to provide vast amount of services to the mobile users. Some of those services require end-to-end encryption between a Service Provider and a SIM card. Keyed SIM cards already contain the required structure for secure key generation and upload, whereas un-keyed SIM cards do not have the required capability for this. In this paper, we provide a key exchange protocol, which creates a symmetric key by the collaborative work of SIM card and the Service Provider server. After a successful protocol run, SIM card and Service Provider can perform end-to-end data encryption.
  • Yayın
    Cryptanalysis of Chaotic Ciphers
    (Springer-Verlag Berlin, 2011) Solak, Ercan
    [No abstract available]