650 Hits in 4.5 sec

Algebraic Countermeasure to Enhance the Improved Summation Generator with 2-Bit Memory

Md. Iftekhar Salam, Hoon-Jae Lee
2013 Journal of Networks  
Recently proposed algebraic attack has been shown to be very effective on several stream ciphers.  ...  It will be shown that due to the irregular and mutual clock controlling in PingPong stream cipher the degree of the generated equation tends to grow up with each successive clock which in turn increases  ...  Algebraic attack on stream cipher includes attacks on nonlinear filter generator [2] , attacks on summation generator [4] , attacks on combiners with memory [2] , attacks on mutually clocked shift register  ... 
doi:10.4304/jnw.8.5.977-984 fatcat:kacqzlbwbrds5crrvjr5kemkuu

The Switching Generator: New Clock-Controlled Generator with Resistance against the Algebraic and Side Channel Attacks

Jun Choi, Dukjae Moon, Seokhie Hong, Jaechul Sung
2015 Entropy  
However, the algebraic attack could be applied directly on these new systems.  ...  There are many attack results using algebraic properties and side channel information against stream ciphers for hardware applications.  ...  Algebraic Attacks on Clock-Controlled Generators In paper [15, 20] , the authors described an algebraic attack against clock-controlled generators with the following properties: • For each register, the  ... 
doi:10.3390/e17063692 fatcat:xaehnmkf3jb5pjikaspbgu7dni

Two Trivial Attacks on A5/1:A GSM Stream Cipher [article]

Ashish Jain, Narendra S. Chaudhari
2013 arXiv   pre-print
In this paper we compared previous attacks on A5/1 as well as an algebraic attack and a new improved guess and determine attack is proposed.  ...  Algebraic attacks are new and very powerful tool to cryptanalyse LFSRs based stream ciphers even non-linear combiner are concerned.  ...  Our Contribution In this paper we describe a simple algebraic attack on the A5/1 stream cipher.  ... 
arXiv:1305.6817v3 fatcat:siyyt3qykrfn3fk7f42bzw2ece

Performance Analysis Of Secured Synchronous Stream Ciphers

Padmalatha Eddla, R.Ravinder Reddy
2011 International Journal of Communication Networks and Security  
and conquer attacks and algebraic attacks are presented.  ...  Apart from the implementation the analysis which includes the security of these algorithms against some attacks related to stream ciphers such as guess and deterministic attacks, correlation attacks, divide  ...  Algebraic attacks Algebraic attacks usually become possible when the key stream is correlated to one or more linearly clocking registers, whose clocking is either entirely predictable or can be guessed  ... 
doi:10.47893/ijcns.2011.1015 fatcat:jjoxnazk2vfdxpoks5e3drxaam

Algebraic Attacks on Stream Ciphers with Linear Feedback [chapter]

Nicolas T. Courtois, Willi Meier
2003 Lecture Notes in Computer Science  
Our new general algebraic attack breaks stream ciphers satisfying all the previously known design criteria in at most the square root of the complexity of the previously known generic attack.  ...  A classical construction of stream ciphers is to combine several LFSRs and a highly non-linear Boolean function f .  ...  Background on LILI-128 and Simple Attacks In principle our algebraic attacks are designed only for regularly clocked stream ciphers (or ciphers clocked in a known way).  ... 
doi:10.1007/3-540-39200-9_21 fatcat:jnfd2hey35eplnbmqahxhei5by

Reconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Based on Complexity [article]

Xiangao Huang and Wei Huang and Xiaozhou Liu and Chao Wang and Zhu jing Wang and Tao Wang
2007 arXiv   pre-print
In this letter we assert that we have reconstructed the nonlinear filter function of LILI-128 stream cipher on IBM notebook PC using MATLAB.  ...  , and two methods produce the same synchronous keystream sequence on same initial state, so that our research work proves that the nonlinear filter function of LILI-128 stream cipher is successfully reconstructed  ...  The clock control subsystem produces an integer sequence that is used to control the clocking of the second subsystem.  ... 
arXiv:cs/0702128v2 fatcat:54x4uvo2hrasjjrxj7kur36vju

Security and performance analysis of SCDSP

Fardous Mohamed Eljadi, Imad Fakhri Al-Shaikhli
2016 International Journal on Perceptive and Cognitive Computing  
There are few approaches that attempt to add dynamicity to the structure of stream ciphers in order to improve their security level. SCDSP is a dynamic stream cipher that based on these approaches.  ...  It uses dynamic structure and parameters to increase the complexity of the cipher to improve its security level. The dynamic parameters are specified using bits from the secret key.  ...  Algebraic Attacks. Algebraic attacks on stream ciphers have received a large amount of attention lately because they are very efficient if the designer is not careful.  ... 
doi:10.31436/ijpcc.v2i1.33 fatcat:5jvdbijgzfcvnl4vmv4277gvlm

Stream cipher designs: a review

Lin Jiao, Yonglin Hao, Dengguo Feng
2020 Science China Information Sciences  
Algebraic attack is used in LFSR-based stream cipher since any stream cipher can be expressed as a system of multivariate algebraic equations depending on the secret key and known keystream, and the system  ...  However, they are both vulnerable against algebraic attack series for the constant algebraic degree, and lose their allure in current stream cipher designs.  ... 
doi:10.1007/s11432-018-9929-x fatcat:owggwpyki5dydekbh6dg7zvofm

Stream Ciphers: A Comparative Study of Attacks and Structures

Daniyal M.Alghazzawi, Syed Hamid Hasan, Mohamed Salim Trigui
2013 International Journal of Computer Applications  
We would not try to evaluate the different designs taken up by various stream ciphers, different attacks agreed out on these stream ciphers and the result of these attacks.  ...  There is no standard model for Stream cipher and their design, in comparison to block ciphers, is based on a number of structures.  ...  Clock-controlled generators Clock controlled generators serve the function of introducing non-linearity in LFSRs.  ... 
doi:10.5120/14412-2498 fatcat:yxtsi3nyrncmrpagp3bubgbway

The rakaposhi Stream Cipher [chapter]

Carlos Cid, Shinsaku Kiyomoto, Jun Kurihara
2009 Lecture Notes in Computer Science  
In this paper, we introduce the rakaposhi stream cipher.  ...  The rakaposhi stream cipher offers 128-bit security, and aims to complement the current eSTREAM portfolio of hardware-oriented stream ciphers.  ...  Thus, we expect that the cipher is secure against distinguishing attacks. Algebraic Attacks Algebraic attacks against stream ciphers were originally proposed in 2003 by Courtois and Meier [9] .  ... 
doi:10.1007/978-3-642-11145-7_5 fatcat:52cbaxtyzrfitiihfx4thhw7gm

A Stream Cipher Proposal: Grain-128

Martin Hell, Thomas Johansson, Alexander Maximov, Willi Meier
2006 2006 IEEE International Symposium on Information Theory  
A new stream cipher, Grain-128, is proposed. The design is very small in hardware and it targets environments with very limited resources in gate count, power consumption, and chip area.  ...  The design is very simple and based on two shift registers, one linear and one nonlinear, and an output function.  ...  Algebraic Attacks Algebraic attacks on stream ciphers have received much attention recently since they can be very efficient if the designer is not careful.  ... 
doi:10.1109/isit.2006.261549 dblp:conf/isit/Hell0MM06 fatcat:brscoilfzbdhbc2biuoxuw4pni

The Nonlinear Filter Boolean Function of LILI-128 Stream Cipher Generator Is Successfully Broken Based on the Complexity of Nonlinear 0 1 Symbol Sequence

Xiangao Huang, Chao Wang, Wei Huang, Junxian Li
2013 Circuits and Systems  
-128 stream cipher generator.  ...  First we measure the complexity of the stream ciphers sequence of LILI-128 stream cipher generator and obtain the shortest bit stream sequence reconstructed Boolean function of nonlinear filter in LILI  ...  An important class of stream ciphers is based on a mixture of linear feedback shift register (LFSR), nonlinear filter generators and also clock-controlled generators [2, 3] .  ... 
doi:10.4236/cs.2013.42022 fatcat:nr4tpshga5g37amfxffwmz3cd4

Next Generation Encryption of Enhanced Light-weight Stream Cipher for Communication Systems

Ndibanje Bruce, Young Sil Lee, Won-Tae Jang, HoonJae Lee
2017 World Journal of Wireless Devices and Engineering  
This paper presents a new generation encryption security system based on stream cipher algorithm to prevent against cyber-attacks and prevent the intrusion to the networks.  ...  The proposed cipher is an LNPingPong family of keystream generator based on the LM-type summation generator which is fast, robust and lightweight for specific devices.  ...  The most common cryptanalysis attacks are: (1) Brute force attacks, (2) Algebraic attacks and (3) Linear attacks.  ... 
doi:10.21742/wjwde.2017.1.1.05 fatcat:twpjrhgsnbhtvepzqm3jam6hhq

Grain: a stream cipher for constrained environments

Martin Hell, Thomas Johansson, Willi Meier
2007 International Journal of Wireless and Mobile Computing  
The hardware complexity and throughput compares favourably to other hardware oriented stream ciphers like E0 and A5/1.  ...  It is based on two shift registers and a nonlinear output function. The cipher has the additional feature that the speed can be increased at the expense of extra hardware.  ...  This suggests that it is hard to completely defeat fault attacks on stream ciphers.  ... 
doi:10.1504/ijwmc.2007.013798 fatcat:gdjw6le47bhyzbcq6z3frnvide

Comparative Study of Vulnerabilities in LTE Cryptographic Algorithm

Fatma Nilofer, Jihad Qaddour
2018 International Journal of Computer Applications  
This paper presents a comparative study of these cryptographic algorithms as well as related attacks and the contribution of various researchers in overcoming these attacks.  ...  After complete analysis and investigation on the advantages and disadvantages of these algorithms, we concluded that AES is one of the strongest among the three cryptographic algorithms, whereas SNOW 3G  ...  plane and control plane.  ... 
doi:10.5120/ijca2018916587 fatcat:claswkciwvcgxh4alvly6yqrni
« Previous Showing results 1 — 15 out of 650 results