Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Cameron McDonald is active.

Publication


Featured researches published by Cameron McDonald.


cryptology and network security | 2013

Truncated Differential Analysis of Reduced-Round LBlock

Sareh Emami; Cameron McDonald; Josef Pieprzyk; Ron Steinfeld

In this paper we present truncated differential analysis of reduced-round LBlock by computing the differential distribution of every nibble of the state. LLR statistical test is used as a tool to apply the distinguishing and key-recovery attacks. To build the distinguisher, all possible differences are traced through the cipher and the truncated differential probability distribution is determined for every output nibble. We concatenate additional rounds to the beginning and end of the truncated differential distribution to apply the key-recovery attack. By exploiting properties of the key schedule, we obtain a large overlap of key bits used in the beginning and final rounds. This allows us to significantly increase the differential probabilities and hence reduce the attack complexity. We validate the analysis by implementing the attack on LBlock reduced to 12 rounds. Finally, we apply single-key and related-key attacks on 18 and 21-round LBlock, respectively.


New Stream Cipher Designs | 2008

Specification for NLSv2

Philip Michael Hawkes; Cameron McDonald; Michael Paddon; Gregory G. Rose; Miriam Wiggers de Vries

NLSv2 is a synchronous stream cipher with message authentication functionality, submitted to the ECrypt Network of Excellence call for stream cipher primitives, profile 1A. NLSv2 is an updated version of NLS [19]. The minor change between NLS and NLSv2 increases resistance to attacks utilizing large amounts of keystream. NLS stands for Non-Linear SOBER, and the NLS ciphers are members of the SOBER family of stream ciphers [12],[16],[23] and [24].


Archive | 2014

Providing an encrypted account credential from a first device to a second device

Cameron McDonald; Matthew Christian Duggan


Archive | 2010

Mobile Device Having An Emergency Mode

Philip Michael Hawkes; Miriam Wiggers de Vries; Craig M. Brown; Alexander Gantman; Jessica M. Purser; Cameron McDonald; Craig W. Northway; Michael Paddon


IACR Cryptology ePrint Archive | 2007

An Algebraic Analysis of Trivium Ciphers based on the Boolean Satisfiability Problem.

Cameron McDonald; Chris Charnes; Josef Pieprzyk


IACR Cryptology ePrint Archive | 2009

Differential Path for SHA-1 with complexity O(2 52 ).

Cameron McDonald; Philip Michael Hawkes; Josef Pieprzyk


Archive | 2013

MOBILE SYNCHRONIZATION TO AID IN EMERGENCY SITUATIONS

Cameron McDonald; Craig M. Brown; Jessica M. Flanagan


Science & Engineering Faculty | 2008

An algebraic analysis of trivium ciphers based on the boolean satisfiability problem

Cameron McDonald; Chris Charnes; Josef Pieprzyk


dagstuhl seminar proceedings | 2007

Design and Primitive Specification for Shannon

Gregory G. Rose; Philip Michael Hawkes; Michael Paddon; Cameron McDonald; Miriam Wiggers de Vries


Archive | 2012

UNLOCKING A BODY AREA NETWORK

Anthony D. Moriarty; Jessica M. Flanagan; Cameron McDonald

Collaboration


Dive into the Cameron McDonald's collaboration.

Researchain Logo
Decentralizing Knowledge