HOME





Josef Pieprzyk
Josef Pieprzyk (born 1949 in Poland) is currently a professor at Queensland University of Technology in Brisbane, Australia. He has worked on cryptography, in particular the XSL attack. He collaborated in the invention of the LOKI and LOKI97 block ciphers and the HAVAL cryptographic hash function A cryptographic hash function (CHF) is a hash algorithm (a map (mathematics), map of an arbitrary binary string to a binary string with a fixed size of n bits) that has special properties desirable for a cryptography, cryptographic application: .... External linksHome page 1949 births Living people Modern cryptographers 20th-century Polish mathematicians 21st-century Polish mathematicians Academic staff of Macquarie University Academic staff of Queensland University of Technology {{Poland-mathematician-stub ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Queensland University Of Technology
The Queensland University of Technology (QUT) is a public university, public research university located in the city of Brisbane in Queensland, Australia. It has two major campuses, a modern city campus in Gardens Point, Brisbane, Gardens Point and a historical campus in Kelvin Grove, Queensland, Kelvin Grove. The university offers courses in fields including architecture, engineering, information technology, healthcare, teaching, law, arts and design, science and mathematics. QUT operated as the Queensland Institute of Technology (QIT'')'' established in 1965 receiving university status by act of Parliament of Queensland in 1988. Queensland University of Technology commenced operations the following year in January 1989. The Brisbane College of Advanced Education, an amalgamation of tertiary colleges dating back to 1849, merged with QUT expanding to its Kelvin Grove site in 1990. In 2022, QUT enrolled 50,216 students, including 37,860 undergraduate and 11,760 postgraduate stud ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Brisbane
Brisbane ( ; ) is the List of Australian capital cities, capital and largest city of the States and territories of Australia, state of Queensland and the list of cities in Australia by population, third-most populous city in Australia, with a population of approximately 2.8 million. Brisbane lies at the centre of South East Queensland, an urban agglomeration with a population of over 4 million. The Brisbane central business district, central business district is situated within a peninsula of the Brisbane River about from its mouth at Moreton Bay. Brisbane's metropolitan area sprawls over the hilly floodplain of the Brisbane River Valley between Moreton Bay and the Taylor Range, Taylor and D'Aguilar Range, D'Aguilar mountain ranges, encompassing several local government in Australia, local government areas, most centrally the City of Brisbane. The demonym of Brisbane is ''Brisbanite''. The Moreton Bay penal settlement was founded in 1824 at Redcliffe, Queensland, Redcliff ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Australia
Australia, officially the Commonwealth of Australia, is a country comprising mainland Australia, the mainland of the Australia (continent), Australian continent, the island of Tasmania and list of islands of Australia, numerous smaller islands. It has a total area of , making it the list of countries and dependencies by area, sixth-largest country in the world and the largest in Oceania. Australia is the world's flattest and driest inhabited continent. It is a megadiverse countries, megadiverse country, and its size gives it a wide variety of landscapes and Climate of Australia, climates including deserts of Australia, deserts in the Outback, interior and forests of Australia, tropical rainforests along the Eastern states of Australia, coast. The ancestors of Aboriginal Australians began arriving from south-east Asia 50,000 to 65,000 years ago, during the Last Glacial Period, last glacial period. By the time of British settlement, Aboriginal Australians spoke 250 distinct l ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Cryptography
Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or ''-logy, -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of Adversary (cryptography), adversarial behavior. More generally, cryptography is about constructing and analyzing Communication protocol, protocols that prevent third parties or the public from reading private messages. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, information security, electrical engineering, digital signal processing, physics, and others. Core concepts related to information security (confidentiality, data confidentiality, data integrity, authentication, and non-repudiation) are also central to cryptography. Practical applications of cryptography include electronic commerce, Smart card#EMV, chip-based payment cards, digital currencies, password, computer passwords, and military communications. ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


XSL Attack
In cryptography, the ''eXtended Sparse Linearization'' (XSL) attack is a method of cryptanalysis for block ciphers. The attack was first published in 2002 by researchers Nicolas Courtois and Josef Pieprzyk. It has caused some controversy as it was claimed to have the potential to break the Advanced Encryption Standard (AES) cipher, also known as Rijndael, faster than an exhaustive search. Since AES is already widely used in commerce and government for the transmission of secret information, finding a technique that can shorten the amount of time it takes to retrieve the secret message without having the key could have wide implications. The method has a high work-factor, which unless lessened, means the technique does not reduce the effort to break AES in comparison to an exhaustive search. Therefore, it does not affect the real-world security of block ciphers in the near future. Nonetheless, the attack has caused some experts to express greater unease at the algebraic simplicity ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

LOKI
Loki is a Æsir, god in Norse mythology. He is the son of Fárbauti (a jötunn) and Laufey (mythology), Laufey (a goddess), and the brother of Helblindi and Býleistr. Loki is married to the goddess Sigyn and they have two sons, Narfi (son of Loki), Narfi or Nari and Váli (son of Loki), Váli. By the jötunn Angrboða, Loki is the father of Hel (being), Hel, the wolf Fenrir and the world serpent Jörmungandr. In the form of a mare, Loki was impregnated by the stallion Svaðilfari and gave birth to the eight-legged horse Sleipnir. Like other gods, Loki is a Shapeshifting, shape shifter and in separate sources appears in the form of a salmon, a mare, a Fly (animal), fly, and possibly an elderly woman named Þökk (Old Norse 'thanks'). While sometimes friendly with the gods, Loki engineers the death of the beloved god Baldr. For this, Odin's specially engendered son Váli binds Loki with the entrails of one of his sons, where he writhes in pain. In the ''Prose Edda'', this son, Nar ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


LOKI97
In cryptography, LOKI97 is a block cipher which was a candidate in the Advanced Encryption Standard competition. It is a member of the LOKI family of ciphers, with earlier instances being LOKI89 and LOKI91. LOKI97 was designed by Lawrie Brown, assisted by Jennifer Seberry and Josef Pieprzyk. Like DES, LOKI97 is a 16-round Feistel cipher, and like other AES candidates, has a 128-bit block size and a choice of a 128-, 192- or 256-bit key length. It uses 16 rounds of a balanced Feistel network to process the input data blocks (see diagram right). The complex round function f incorporates two substitution-permutation layers in each round. The key schedule is also a Feistel structure – an unbalanced one unlike the main network — but using the same F-function. The LOKI97 round function (shown right) uses two columns each with multiple copies of two basic S-boxes. These S-boxes are designed to be highly non-linear and have a good XOR profile. The permutations before and betw ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Block Cipher
In cryptography, a block cipher is a deterministic algorithm that operates on fixed-length groups of bits, called ''blocks''. Block ciphers are the elementary building blocks of many cryptographic protocols. They are ubiquitous in the storage and exchange of data, where such data is secured and authenticated via encryption. A block cipher uses blocks as an unvarying transformation. Even a secure block cipher is suitable for the encryption of only a single block of data at a time, using a fixed key. A multitude of modes of operation have been designed to allow their repeated use in a secure way to achieve the security goals of confidentiality and authenticity. However, block ciphers may also feature as building blocks in other cryptographic protocols, such as universal hash functions and pseudorandom number generators. Definition A block cipher consists of two paired algorithms, one for encryption, , and the other for decryption, . Both algorithms accept two inputs: an input ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




HAVAL
HAVAL is a cryptographic hash function. Unlike MD5, but like most modern cryptographic hash functions, HAVAL can produce hashes of different lengths – 128 bits, 160 bits, 192 bits, 224 bits, and 256 bits. HAVAL also allows users to specify the number of rounds (3, 4, or 5) to be used to generate the hash. HAVAL was broken in 2004. HAVAL was invented by Yuliang Zheng, Josef Pieprzyk, and Jennifer Seberry in 1992. HAVAL hashes The HAVAL hashes (also termed ''fingerprints'') are typically represented as 32-, 40-, 48-, 56- or 64-digit hexadecimal numbers. The following demonstrates a 43-byte ASCII input and the corresponding HAVAL hash (256 bits, 5 passes): HAVAL("The quick brown fox jumps over the lazy og", 256, 5) = b89c551cdfe2e06dbd4cea2be1bc7d557416c58ebb4d07cbc94e49f710c55be4 Even a small change in the message will (with overwhelming probability) result in a completely different hash, e.g. changing the letter to a produces the following hash value: HAVAL("The quick brow ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Cryptographic Hash Function
A cryptographic hash function (CHF) is a hash algorithm (a map (mathematics), map of an arbitrary binary string to a binary string with a fixed size of n bits) that has special properties desirable for a cryptography, cryptographic application: * the probability of a particular n-bit output result (hash value) for a random input string ("message") is 2^ (as for any good hash), so the hash value can be used as a representative of the message; * finding an input string that matches a given hash value (a ''pre-image'') is infeasible, ''assuming all input strings are equally likely.'' The ''resistance'' to such search is quantified as security strength: a cryptographic hash with n bits of hash value is expected to have a ''preimage resistance'' strength of n bits, unless the space of possible input values is significantly smaller than 2^ (a practical example can be found in ); * a ''second preimage'' resistance strength, with the same expectations, refers to a similar problem of f ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

1949 Births
Events January * January 1 – A United Nations-sponsored ceasefire brings an end to the Indo-Pakistani War of 1947. The war results in a stalemate and the division of Kashmir, which still continues as of 2025 * January 2 – Luis Muñoz Marín becomes the first democratically elected Governor of Puerto Rico. * January 11 – The first "networked" television broadcasts take place, as KDKA-TV in Pittsburgh, Pennsylvania, goes on the air, connecting east coast and mid-west programming in the United States. * January 16 – Şemsettin Günaltay forms the new government of Turkey. It is the 18th government, last One-party state, single party government of the Republican People's Party. * January 17 – The first Volkswagen Beetle, VW Type 1 to arrive in the United States, a 1948 model, is brought to New York City, New York by Dutch businessman Ben Pon Sr., Ben Pon. Unable to interest dealers or importers in the Volkswagen, Pon sells the sample car to pay his ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Living People
Purpose: Because living persons may suffer personal harm from inappropriate information, we should watch their articles carefully. By adding an article to this category, it marks them with a notice about sources whenever someone tries to edit them, to remind them of WP:BLP (biographies of living persons) policy that these articles must maintain a neutral point of view, maintain factual accuracy, and be properly sourced. Recent changes to these articles are listed on Special:RecentChangesLinked/Living people. Organization: This category should not be sub-categorized. Entries are generally sorted by family name In many societies, a surname, family name, or last name is the mostly hereditary portion of one's personal name that indicates one's family. It is typically combined with a given name to form the full name of a person, although several give .... Maintenance: Individuals of advanced age (over 90), for whom there has been no new documentation in the last ten ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]