267 Hits in 3.2 sec

Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers [chapter]

Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao
2004 Lecture Notes in Computer Science  
At Indocrypt'2002, Arnault et al. proposed a new class of self-synchronizing stream ciphers combining LFSR and FCSR architectures. It was claimed to be resistant to known attacks.  ...  In this paper, we show that such a self-synchronizing stream cipher is extremely vulnerable to chosen ciphertext attack.  ...  In [1] , a new class of self-synchronous stream ciphers was proposed which exploits the concatenation of LFSR and FCSR.  ... 
doi:10.1007/978-3-540-30556-9_7 fatcat:7o556p6oererpk5v4xeqbmn7mu

Two Attacks Against the HBB Stream Cipher [chapter]

Antoine Joux, Frédéric Muller
2005 Lecture Notes in Computer Science  
Hiji-Bij-Bij (HBB) is a new stream cipher proposed by Sarkar at Indocrypt'03. In this algorithm, classical LFSRs are replaced by cellular automata (CA).  ...  The resulting attack is very efficient since it recovers the secret key by processing a chosen message of length only 2 Kbytes. Then we describe an algebraic attack against the basic mode of HBB.  ...  Background on Self-synchronizing Stream Ciphers Generally a Self-Synchronizing Stream Cipher (SSSC) is one in which the keystream bit is a function of the key and a fixed number m of previous ciphertext  ... 
doi:10.1007/11502760_22 fatcat:rgmdf7j3fjgejblq5vk6qreria

New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers [chapter]

Shahram Khazaei, Willi Meier
2008 Lecture Notes in Computer Science  
In this work we focus on self-synchronizing stream ciphers.  ...  We also open a new window for answering a crucial question raised by Fischer et. al. regarding the problem of finding weak IV bits which is essential for their attack.  ...  Attack Models on Self-Synchronizing Stream Ciphers There are two kinds of attack on synchronizing stream ciphers: distinguishing attacks and key recovery attacks 1 .  ... 
doi:10.1007/978-3-540-89754-5_2 fatcat:ryki6ajp3bd7pbcwxcpp4ixbzi

Chosen-Ciphertext Attacks Against MOSQUITO [chapter]

Antoine Joux, Frédéric Muller
2006 Lecture Notes in Computer Science  
Self-Synchronizing Stream Ciphers (SSSC) are a particular class of symmetric encryption algorithms, such that the resynchronization is automatic, in case of error during the transmission of the ciphertext  ...  In this paper, we extend the scope of chosen-ciphertext attacks against SSSC. Previous work in this area include the cryptanalysis of dedicated constructions, like KNOT, HBB or SSS.  ...  Self-Synchronizing Stream Ciphers (SSSC) are a special primitive : they are often considered as a simple subclass of stream ciphers, but there are also some similarities with block ciphers.  ... 
doi:10.1007/11799313_25 fatcat:bl2wfjgpzvgn3prlz6sknorsfi


2010 International Journal of Bifurcation and Chaos in Applied Sciences and Engineering  
In this paper, we focus on a special class of symmetric ciphers, namely the Self-Synchronizing Stream Ciphers.  ...  Open issues related to the validation and the implementation of Self-Synchronizing Stream Ciphers are developped.  ...  Less attention has been paid on a special class of symmetric ciphers, namely the self-synchronizing stream ciphers.  ... 
doi:10.1142/s0218127410027532 fatcat:zkp2tnoohvgovjdsn5kj5osfte

Modes of Operation of Stream Ciphers [chapter]

Jovan Dj. Golić
2001 Lecture Notes in Computer Science  
It is proposed how to construct secure self-synchronizing stream ciphers, keyed hash functions, hash functions, and block ciphers from any secure stream cipher with memory.  ...  A general stream cipher with memory in which each ciphertext symbol depends on both the current and previous plaintext symbols, as well as each plaintext symbol depends on both the current and previous  ...  It is proposed how to obtain a secure self-synchronizing stream cipher from any secure stream cipher in the SCM mode.  ... 
doi:10.1007/3-540-44983-3_17 fatcat:ch7qw75is5ekhm555hw3nudnv4

Security proof of the canonical form of self-synchronizing stream ciphers

Brandon Dravie, Philippe Guillot, Gilles Millérioux
2016 Designs, Codes and Cryptography  
This paper studies the security level expected by the canonical form of the Self-Synchronizing Stream Cipher (SSSC).  ...  In this case, it is shown that the security against chosen-ciphertext attacks (IND-CCA security) cannot be reached for the canonical form of the SSSC, but it is however secure against chosen plaintext  ...  Introduction Self-Synchronizing Stream Ciphers (SSSC) was patented in 1946.  ... 
doi:10.1007/s10623-016-0185-8 fatcat:4iau34e5pjamnpxaluphk763mu

Stream ciphers and the eSTREAM project

Vincent Rijmen
2010 Isecure  
In this paper, we present a survey of the eSTREAM project. We also review recent time/memory/data and time/memory/key trade-offs relevant for the generic attacks on stream ciphers.  ...  A B S T R A C T Stream ciphers are an important class of symmetric cryptographic algorithms. The eSTREAM project contributed significantly to the recent increase of activity in this field.  ...  Acknowledgements This article is based on a talk I gave at ICISC 2008; I would like to thank its organizers for inviting me to talk on this topic.  ... 
doi:10.22042/isecure.2015.2.1.2 dblp:journals/isecure/Rijmen10 fatcat:kqanxjbr4jg5fjci7qm7jrpczy

Slide Attacks [chapter]

Alex Biryukov, David Wagner
1999 Lecture Notes in Computer Science  
In this paper we describe a new generic known-(or sometimes chosen-) plaintext attack on product ciphers, which we call the slide attack and which in many cases is independent of the number of rounds of  ...  We illustrate the power of this new tool by giving practical attacks on several recently designed ciphers: TREYFER, WAKE-ROFB, and variants of DES and Blowfish.  ...  Also, we are grateful to Craig Clapp, Lars Knudsen, and the FSE6 program committee for detailed comments on the paper.  ... 
doi:10.1007/3-540-48519-8_18 fatcat:eatwjthccbab5gz3bjhzcbzmoe

Cryptanalysis of SBLH [chapter]

Goce Jakimovski, Ljupčo Kocarev
2002 Lecture Notes in Computer Science  
In this brief report, we suggest a possible chosen ciphertext attack on SBLH. We show that with 2 24 ciphertext/plaintext pairs, one can successfully recover the active key of length 2 17 bits.  ...  SBLH is a 256-bit key stream cipher that is used in Business Security's products for voice, fax and data communication. The cipher is claimed to be quite unique and yet very powerful.  ...  Chosen Ciphertext Attack In this section we will describe a chosen ciphertext attack on SBLH.  ... 
doi:10.1007/3-540-45473-x_12 fatcat:3tvxhkagvbatdaz7lzk3d4m4k4

Optimized Self-Synchronizing Mode of Operation [chapter]

Ammar Alkassar, Alexander Geraldy, Birgit Pfitzmann, Ahmad-Reza Sadeghi
2002 Lecture Notes in Computer Science  
Several applications need a self-synchronizing mode of operation, i.e., an error in the ciphertext must only lead to a small amount of incorrect plaintext.  ...  We propose a new mode of operation based on CFB which remedies this problem.  ...  Chosen-ciphertext security is not required in [BDJR97] , and it cannot be required in the strict sense for a self-synchronizing cipher: This would correspond to non-malleability, but the purpose of self-synchronization  ... 
doi:10.1007/3-540-45473-x_7 fatcat:rrflh2prpffzhptsims5tmb3fe

Privacy and authentication: An introduction to cryptography

W. Diffie, M.E. Hellman
1979 Proceedings of the IEEE  
o f the a p p t i a t i o n of uyptography to the security of timeduring systems and computer networks.  ...  The basic information li~eoretic and computational properties of d a d d and modern cryptographic systems are presented, fobwed by uyptanalytic examination of seved important systems and an exlminrtion  ...  Another frequently encountered class of stream systems is called self-synchronizing or ciphertext autokey, and is typified by the operation of the DES in cipher feedback mode Fig. 13 .  ... 
doi:10.1109/proc.1979.11256 fatcat:dctzswht4jdcpprjsdvstzotmi

Synchronization of hybrid systems for secure multimedia streaming

J. Parriaux, G. Millerioux
2010 2010 7th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP 2010)  
The paper describes theoretical and practical aspects regarding an FPGA implementation of a secure multimedia streaming setup.  ...  The class of hybrid dynamical systems is addressed with special emphasis on piecewise linear dynamical systems.  ...  Finally, we express our gratitude to Yves Berviller, Serge Weber and Sébastien Calvi for their implication in the achievement of the test device.  ... 
doi:10.1109/csndsp16145.2010.5580427 fatcat:bse2pyrdgvgmhpdqn7hxhdsjme

A connection between chaotic and conventional cryptography

Gilles Millerioux, Jose Maria Amigo, Jamal Daafouz
2008 IEEE Transactions on Circuits and Systems Part 1: Regular Papers  
The main point of this survey can be stated as follows: (hybrid) message-embedding is strictly equivalent to a conventional self-synchronizing stream cipher under flatness conditions.  ...  The synchronization mechanism of the two chaotic signals is known as chaos synchronization.  ...  There are two classes of stream ciphers, the difference lying in the way the keystream is generated: the synchronous stream ciphers (SSC) and the self-synchronous stream ciphers (SSSC). Fig. 8 .  ... 
doi:10.1109/tcsi.2008.916555 fatcat:7vrvmwqrafetbc5u4ct3v7fx4y

Designing self-synchronizing switched linear systems: An application to communications

Jérémy Parriaux, Gilles Millérioux
2013 Nonlinear Analysis. Hybrid Systems  
Next, the finite-time synchronization is relaxed to give rise to a so-called statistical self-synchronization, a mode of operation which makes sense in classical cryptography which operates over finite  ...  It is shown that the notion of flatness is central for guaranteeing a finite-time self-synchronization and that the concept of transmission zero plays also an important role.  ...  Hence, the constructions proposed in this paper can be considered as a first step towards a complete framework for designing new classes of self-synchronizing stream ciphers.  ... 
doi:10.1016/j.nahs.2012.05.001 fatcat:i5nw4mfcsvdfrez56se753c34e
« Previous Showing results 1 — 15 out of 267 results