Towards Reducing the Gap between Cryptography and Its Usage
- 1 January 2019
- journal article
- research article
- Published by Institute of Electronics, Information and Communications Engineers (IEICE) in IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
- Vol. E102.A (1) , 11-16
- https://doi.org/10.1587/transfun.e102.a.11
Abstract
ICT development progresses, and many cryptographic algorithms are used. The most of cryptographic algorithms require assumptions to guarantee their security, but it is sometimes not clearly written. This causes many problems. This paper shows previous cases, and suggests to concede cryptographers and system developer each other from an industrial cryptographers viewpoint.Keywords
This publication has 6 references indexed in Scilit:
- Key Reinstallation AttacksPublished by Association for Computing Machinery (ACM) ,2017
- On the Practical (In-)Security of 64-bit Block CiphersPublished by Association for Computing Machinery (ACM) ,2016
- Public KeysPublished by Springer Nature ,2012
- Bug AttacksPublished by Springer Nature ,2008
- Attacks on Cryptographic Hashes in Internet ProtocolsPublished by RFC Editor ,2005
- The MD5 Message-Digest AlgorithmPublished by RFC Editor ,1992