Main menu

What is LaTeX?

Latex is a language for high quality editing documents, especially oriented to book composition, scientific and technical documents, that include formulas and high quality images. It consists on a set of Tex macros (one low-level language) and has become almost a standard for scientific publications in areas such as mathematics, physics and engineering, since we can have finer control over any typographical appearance of the document.
Read more...

AES: Other attacks

It is clear that so far, none of the attacks carried out against full-AES has been successful, these attacks usually focus on reducing rounds. Many authors claim that none of the following types of attacks have been more effective than an exhaustive-key search: Linear cryptanalysis Differential Cryptanalysis Truncated diferencials Interpolation attacks Square attack However, the ordered structure and the deep mathematical basis that AES uses, make it an object of study for new attacks proposals such as algebraic attacks. These attacks consist on propose an equation system, and with the unknowns of the system, it can deduce the key; one…
Read more...

How to install SPAN?

Security Protocol Animator (SPAN) is a free tool to check cryptographic protocols that helps in searching and characterization of attacks. The main advantage of this application is that allows different verification techniques using a same protocol. We can say, it is a graphical interface for managing HLPSL (High-Level Protocol Specification Language) and CAS + (an implementation of the Protocol Central Authentication), which allows the translation between these languages ​​and also provides a friendly graphical user interface. SPAN helps to produce interactively sequences messages or MSC (Message Sequence Charts). This tool is used for simulating cryptographic protocol, allows active or passive…
Read more...

Femto-cell: challenges in managing interferences

Some studies show that over 50% of voice calls and 70% of the data traffic comes from inside [1], voice calls do not require high bandwidth, but certain quality parameters are require to ensure the voice recognition of users at the other end of the communication, on the contrary, the data traffic requires high transmission rates to send information with a lot of megabytes, such as multimedia applications require, to name one example. One way to ensure high transmission rates on radio systems, is to maintain high signal quality at both ends of the communication, and hence, mitigate the effects…
Read more...

Attack on AES: Omission of MixColumns

As we mentioned in a previous article, rounds that make up the AES algorithm can be divided into three different categories: initial rounds, standard round and final round. When encryption, the information is subjected to a different number of rounds (10, 12 and 14 respectively) in each case depending on the length of the key (128, 192 and 256 respectively). Each such round is made up of combinations of transformations, the possible transformations include: ByteSub, ShiftRow, MixColumns and AddRoundKey. Figure # 1 shows the relationship of the transformation and corresponding rounds.   Figure # 1: Distribution of the transformations in…
Read more...
Subscribe to this RSS feed

Facebook TwitterRSS