A limitation on security evaluation of cryptographic primitives with fixed keys.
Yutaka KawaiGoichiro HanaokaKazuo OhtaNoboru KunihiroPublished in: Secur. Commun. Networks (2016)
Keyphrases
- security properties
- hash functions
- security protocols
- key management
- security requirements
- information security
- encryption scheme
- stream cipher
- access control
- security issues
- cryptographic protocols
- random number generator
- encryption decryption
- intrusion detection
- secret key
- cryptographic algorithms
- public key encryption
- high level
- evaluation method
- network security
- low level