Filters








18 Hits in 4.2 sec

A Weakness of the Linear Part of Stream Cipher MUGI [chapter]

Jovan Dj. Golić
2004 Lecture Notes in Computer Science  
The linearly updated component of the stream cipher MUGI, called the buffer, is analyzed theoretically by using the generating function method.  ...  It is then shown how this weakness can in principle be used to facilitate the linear cryptanalysis of MUGI with two main objectives: to reconstruct the secret key and to find linear statistical distinguishers  ...  Acknowledgment This work is based on a result of evaluation requested by the Japanese CRYP-TREC project: http://www.ipa.go.jp/security/enc/CRYPTREC/index-e.html.  ... 
doi:10.1007/978-3-540-25937-4_12 fatcat:jkmb7nzffjebvfbqo3hhz7w2uy

Analysis of the Non-linear Part of Mugi [chapter]

Alex Biryukov, Adi Shamir
2005 Lecture Notes in Computer Science  
This paper presents the results of a preliminary analysis of the stream cipher Mugi. We study the nonlinear component of this cipher and identify several potential weaknesses in its design.  ...  For example, it is possible to recover the full 1216-bit state of the cipher and the original 128-bit secret key using just 56 words of known stream and in 2 14 steps of analysis if the cipher outputs  ...  Attacking the Non-linear part of Mugi In this section we present an attack that efficiently recovers the 192-bit nonlinear state of the cipher when part of the buffer is known to the attacker.  ... 
doi:10.1007/11502760_21 fatcat:nakjuv2esnc3zbujqiohs7v2ry

Rekeying Issues in the MUGI Stream Cipher [chapter]

Matt Henricksen, Ed Dawson
2006 Lecture Notes in Computer Science  
MUGI [15] is a word-based stream cipher designed for 64bit architectures.  ...  the size of its master key.  ...  Acknowledgements Many thanks to Minna Yao and the anonymous referees for their feedback on this paper.  ... 
doi:10.1007/11693383_12 fatcat:4fpgwujubjhozcsp4i3j24pjtm

A New Keystream Generator MUGI [chapter]

Dai Watanabe, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, Bart Preneel
2002 Lecture Notes in Computer Science  
On the other hand the security was evaluated according to re-synchronization attack, related-key attack, and linear correlation of an output sequence. Our analysis confirms that MUGI is a secure KSG.  ...  We present a new keystream generator (KSG) MUGI, which is a variant of Panama proposed at FSE '98.  ...  Conclusion We have proposed a new keystream generator MUGI built on the idea of Panama. MUGI is efficient in both hardware and software.  ... 
doi:10.1007/3-540-45661-9_14 fatcat:nsnfxzv4zna3bcahtv7qkbnwla

Stream cipher designs: a review

Lin Jiao, Yonglin Hao, Dengguo Feng
2020 Science China Information Sciences  
LFSR based stream cipher Rueppel [48] divided the design of stream ciphers into two parts: the driving part and nonlinear part, where the driving part is used to generate the basic source sequences with  ...  No security flaw of the full MUGI stream cipher has been reported so far. MUGI is word-oriented with a word size of 64 bits, and its internal state consists of 19 words.  ... 
doi:10.1007/s11432-018-9929-x fatcat:owggwpyki5dydekbh6dg7zvofm

RC4-2S: RC4 Stream Cipher with Two State Tables [chapter]

Maytham M. Hammood, Kenji Yoshigoe, Ali M. Sagheer
2013 Lecture Notes in Electrical Engineering  
However, RC4 cipher shows some weaknesses including a correlation problem between the public known outputs of the internal state.  ...  One of the most important symmetric cryptographic algorithms is Rivest Cipher 4 (RC4) stream cipher which can be applied to many security applications in real time security.  ...  There are a number of stream cipher algorithms presented to implement high performance software including IDEA, ORYX, LEVIATHAN, MUGI, RC4, Helix, SEAL, SOBER, and SNOW.  ... 
doi:10.1007/978-94-007-6996-0_2 fatcat:suh4eixqt5fqdoh3rbf6nd37z4

Attack the Dragon [chapter]

Håkan Englund, Alexander Maximov
2005 Lecture Notes in Computer Science  
The original idea of the design is to use a nonlinear feedback shift register (NLFSR) and a linear part (counter), combined by a filter function to generate a new state of the NLFSR and produce the keystream  ...  1 Dragon is a word oriented stream cipher submitted to the ECRYPT project, it operates on key sizes of 128 and 256 bits.  ...  After a few rounds of the project evaluation, all of the stream cipher proposals were found to contain some weaknesses. At the end, no stream cipher was included in the final portfolio.  ... 
doi:10.1007/11596219_11 fatcat:gctfnyxpf5cllbmiemtgtxpdnm

Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations

Rahul Saha, G. Geetha, Gulshan Kumar, Hye-Jim Kim
2017 International Journal of Grid and Distributed Computing  
in different parts of the algorithms.  ...  , stream ciphers and hash functions.  ...  It works by analysing the (NDS) key schedule and exploiting weaknesses in it to break the cipher.  ... 
doi:10.14257/ijgdc.2017.10.11.08 fatcat:mhzncwjbbrfc3elpsaaxgkwhsa

Security and performance analysis of SCDSP

Fardous Mohamed Eljadi, Imad Fakhri Al-Shaikhli
2016 International Journal on Perceptive and Cognitive Computing  
There are few approaches that attempt to add dynamicity to the structure of stream ciphers in order to improve their security level. SCDSP is a dynamic stream cipher that based on these approaches.  ...  It uses dynamic structure and parameters to increase the complexity of the cipher to improve its security level. The dynamic parameters are specified using bits from the secret key.  ...  Cryptrec highly recommended a number of stream ciphers among them: 128 bit RC4, MUGI and MULTI-S01 [4] .  ... 
doi:10.31436/ijpcc.v2i1.33 fatcat:5jvdbijgzfcvnl4vmv4277gvlm

Enhancing Security and Speed of RC4

Maytham M. Hammood et. al.
2015 International Journal of Computing and Network Technology  
In this paper, we propose RC4 stream cipher with a random initial state (RRC4) to solve the weak keys problem of the RC4 using a random initialization of internal state S.  ...  However, the RC4 cipher shows some weaknesses, including a correlation problem between the public known outputs of the internal state.  ...  ACKNOWLEDGMENT This work was supported in part by the National Science Foundation under Grant CRI CNS-0855248, Grant EPS-0701890, Grant EPS-0918970, and Grant MRI CNS-0619069.  ... 
doi:10.12785/ijcnt/030201 fatcat:nxesce4z6vabrcx5kvxixohgna

A Distinguishing Attack of SNOW 2.0 with Linear Masking Method [chapter]

Dai Watanabe, Alex Biryukov, Christophe De Cannière
2004 Lecture Notes in Computer Science  
SNOW 2.0 was developed by Johansson and Ekdahl in 2002, as a modified version of SNOW 1.0. In this paper we present the application of linear (masking) attack to SNOW 2.0 stream cipher.  ...  Our attack requires 2 225 output words (2 230 bits) and 2 225 steps of analysis to distinguish the output of SNOW 2.0 from a truly random bit sequence.  ...  He pointed out that our experimental result in Table 1 was incorrect, and helped us to correct the values of the mask set and the corresponding biases.  ... 
doi:10.1007/978-3-540-24654-1_16 fatcat:nhchu6rks5cffmn7l5rztqmtwq

Dragon: A Fast Word Based Stream Cipher [chapter]

Kevin Chen, Matt Henricksen, William Millan, Joanne Fuller, Leonie Simpson, Ed Dawson, HoonJae Lee, SangJae Moon
2005 Lecture Notes in Computer Science  
This paper presents Dragon, a new stream cipher constructed using a single word based non-linear feedback shift register and a nonlinear filter function with memory.  ...  Dragon uses simple operations on 32-bit words to provide a high degree of efficiency in a wide variety of environments, making it highly competitive when compared with other word based stream ciphers.  ...  Also, the security of some LFSR based stream ciphers is threatened by algebraic attacks [6] . Word based stream ciphers may provide a solution to the security-efficiency tradeoff.  ... 
doi:10.1007/11496618_5 fatcat:yelitr7z5nguzdfbhjr5sqnvcu

Fast correlation attacks against stream ciphers and related open problems

A. Canteaut
2005 IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005.  
However, a better adaptation of these techniques to the concrete involved stream ciphers is still an open issue.  ...  Fast correlation attacks have been considerably improved recently, based on efficient decoding algorithms dedicated to very large linear codes in the case of a highly noisy channel.  ...  context of a given stream cipher.  ... 
doi:10.1109/itwtpi.2005.4638690 dblp:conf/icits/Canteaut05 fatcat:o3fxmlf2mjcgljtp6mv7aoekqe

A Linear Distinguishing Attack on Scream

Alexander Maximov, Thomas Johansson
2007 IEEE Transactions on Information Theory  
A linear distinguishing attack on the Scream stream cipher is proposed. The attack uses approximately 2 105 output words and has complexity of a similar size.  ...  Quite a few proposals have been given. However, many of them suffer from a number of small cryptographic weaknesses.  ...  Nonlinear parts of a cipher are substituted by some linear approximation functions, plus noise. Then, all operations in the "linearized" cipher are linear.  ... 
doi:10.1109/tit.2007.903131 fatcat:ywurpbehlfhl7clh4m6oy2qfam

A linear distinguishing attack on Scream

T. Johansson, A. Maximov
2003 IEEE International Symposium on Information Theory, 2003. Proceedings.  
A linear distinguishing attack on the Scream stream cipher is proposed. The attack uses approximately 2 105 output words and has complexity of a similar size.  ...  Quite a few proposals have been given. However, many of them suffer from a number of small cryptographic weaknesses.  ...  Nonlinear parts of a cipher are substituted by some linear approximation functions, plus noise. Then, all operations in the "linearized" cipher are linear.  ... 
doi:10.1109/isit.2003.1228178 fatcat:rm4s6ir3pre23ibekqj7ujfpre
« Previous Showing results 1 — 15 out of 18 results