Filters








479 Hits in 3.0 sec

Cryptanalysis of the Stream Cipher DECIM [chapter]

Hongjun Wu, Bart Preneel
2006 Lecture Notes in Computer Science  
DECIM is a hardware oriented stream cipher with an 80-bit key and a 64-bit IV. In this paper, we point out two serious flaws in DECIM. One flaw is in the initialization of DECIM.  ...  The amount of computation required in the attack is negligible. Another flaw is in the keystream generation algorithm of DECIM.  ...  Acknowledgements The authors would like to thank the anonymous reviewers for their helpful comments.  ... 
doi:10.1007/11799313_3 fatcat:k4fw76x7w5fcrn7566uchh7tx4

Cryptanalysis of Stream Cipher Cryptosystem Based on Soft Computing Techniques

Prof .DrSalim Ali Abbas Al-Ageelee, RiyamNoori Jwad
2017 IOSR Journal of Computer Engineering  
This paper presents a new investigation for cryptanalysis stream cipher based on Genetic Algorithm(GAs), Particle Swarm Optimization (PSO).GA and PSO utilized for the automatic recovery of the key, and  ...  Based on a mathematical model, it is shown that such algorithms can be used to reduce the number of trials which are needed to determine the initial state of the attacked generator using ciphertext only  ...  Table (1) shows the different parameters of GA to cryptanalysis stream cipher Systems. 4.3Using PSO algorithm to cryptanalysis stream Cipher In Evaluation For the initial population, the cryptanalysis  ... 
doi:10.9790/0661-1901047884 fatcat:odqddbttp5cito4kdr2vph32w4

A Simple Algebraic Model based Polyalphabetic Substitution Cipher

Sukalyan Som, Sabyasachi Ghosh
2012 International Journal of Computer Applications  
This key strengthens the cipher and it does not allow the cipher to be broken by the known plain text attack. The cryptanalysis performed clearly indicates that the cipher is a strong one. .  ...  Keywords Polyalphabetic substitution, variable length key stream, bitratio test, frequency test.  ...  Convert the character to their corresponding ASCII (decimal) equivalent. 6. Add 2 to the ASCII value of the character.  ... 
doi:10.5120/4844-7111 fatcat:l4bjnouzgbfwbcabxtrig2jckm

NON LINEAR FEEDBACK STREAM CIPHER

Dr .R. Siva Ram Prasad, G. Murali, S. Gopi Krishna
2012 International journal of computer and communication technology  
The main aim of this paper is to develop a new generation and innovative security software for applications. We proposed new stream cipher called NLFS.  ...  In synchronous mode key stream is independent of plain text and cipher text. In selfsynchronous mode key stream generation depending on cipher text.  ...  Linear Cryptanalysis Linear cryptanalysis is a method to reconstruct secret key by solving linear equations of key stream generators of stream ciphers.  ... 
doi:10.47893/ijcct.2012.1128 fatcat:3uzhjlwx7bfaracnqigkxuiigu

Cryptanalysis of Nonlinear Stream Cipher Cryptosystem based on Improved Particle Swarm Optimization

Salim A. Abbas Al-Ageelee, Riyam N. J. Kadhum
2017 International Journal of Applied Information Systems  
Stream cipher is one of the hard electronic cipher systems because of high security and difficulty in breaking it.  ...  the initial state of the attacked stream cipher cryptosystem using ciphertext only attack.  ...  For the GA parameters there are a set of values which are considered as the most appropriate to attacks stream cipher by GA different parameters of GA to cryptanalysis stream cipher Systems (see Table  ... 
doi:10.5120/ijais2017451658 fatcat:6phuaki2mffdtemzsmjkzq6glm

The State of Stream Ciphers

Masakatu MORII, Ryoichi TERAMURA
2009 IEICE ESS FUNDAMENTALS REVIEW  
Roos, A class of weak keys in the RC4 stream cipher, Two posts in sci.crypt, 1995. 39, pp.71-76, Sept. 2007. 18 S. Fluhrer, I. Mantin, and A.  ...  Preneel, A new key stream generator MUGI, Proc. FSE2002, LNCS 2365, pp.179-194, 2002. 5 P. Ekdahl and T. Johansson, A new version of the stream cipher SNOW, Proc.  ... 
doi:10.1587/essfr.2.3_66 fatcat:nrohgmqeaffhfaq4zvj5spepie

Page 4597 of Mathematical Reviews Vol. , Issue 2002F [page]

2002 Mathematical Reviews  
Next, we derive a lower bound on the period of a [1,k] self-decimated m-sequence for 3 <k < L. Finally, we present the exact values of the bit pair frequencies of [1,2] self-decimated m-sequences.  ...  Summary: “In the stability theory of stream ciphers, the philoso- phy is that a good keystream should not only have a large linear complexity, but that a small number of bit changes should not cause a  ... 

Secure and Fast Chaos based Encryption System using Digital Logic Circuit

Ankur A. Khare, Piyush B. Shukla, Sanjay C. Silakari
2014 International Journal of Computer Network and Information Security  
Cryptanalysis of the proposed algorithm shows the strength and security of algorithm and keys.  ...  An avalanche effect is the attractive property of cryptography in which two different keys produce different cipher text for the same data information and also some Important properties related to chaotic  ...  Today, Most of data information is transmitted in the form of a stream of bits over the internet.  ... 
doi:10.5815/ijcnis.2014.06.04 fatcat:yay2zaf7ubbdjmzsacl6lijv5i

Cryptanalysis of a Pseudorandom Generator for Cross-Border E-Commerce

Lelai Shi, Suhui Liu, Slobodan Petrović
2019 Ingénierie des Systèmes d'Information  
The experimental results show that such a generalized method of cryptanalysis is feasible.  ...  A method of cryptanalysis of cascades containing two such LFSRs is well known. We generalize this method to cryptanalysis of a cascade with an arbitrary number of LFSRs.  ...  In this paper, we consider stream ciphers, a large class of so-called symmetric ciphers, and we concentrate on cryptanalysis of cascades of irregularly clocked LFSRs ( Figure 3 ) realized through the  ... 
doi:10.18280/isi.240401 fatcat:nvd3hu5qjrbmxgvx7kd2lvjdva

FPGA Based Cipher Design & Implementation of Recursive Oriented Block Arithmetic and Substitution Technique (ROBAST)

Rajdeep Chakraborty, JK Mandal,
2011 International Journal of Advanced Computer Science and Applications  
A block of n-bits is taken as an input stream, where n ranges from 8 to 256 -bit, then ROBAST is applied in each block to generate intermediate stream, any one intermediate stream is considered as a cipher  ...  The same operation is performed repeatedly on various block sizes. It is a kind of block cipher and symmetric in nature hence decoding is done in similar manner.  ...  ACKNOWLEDGMENT The authors express their deep sense of gratitude to The Department of Computer Science and Engineering, Netaji Subhash Engineering College, Garia, Kolkata, West Bengal, India and The Department  ... 
doi:10.14569/ijacsa.2011.020408 fatcat:isun4tf2qnbnro6blex77zepja

A Simple Linearisation of the Self-shrinking Generator [chapter]

Sara D. Cardell, Amparo Fúster-Sabater
2015 Lecture Notes in Computer Science  
Irregularly decimated generators are very simple sequence generators to be used as keystream generators in stream ciphers.  ...  Nowadays stream ciphers are the fastest among the encryption procedures, thus they are performed in many practical applications.  ...  The work of the first author was partially supported by Generalitat Valenciana (Spain) with reference APOSTD/2013/081 and by FAPESP with number of process 2015/07246-0.  ... 
doi:10.1007/978-3-319-27340-2_2 fatcat:ix6pv5qoerdrliuob42fnw7r2y

BSEA-1 - A Stream Cipher Backdooring Technique [article]

Eric Filiol
2019 arXiv   pre-print
Considering a particular family (among all the possible ones) of backdoors, we present BSEA-1, a stream cipher algorithm which contains a design backdoor enabling an effective cryptanalysis.  ...  The BSEA-1 algorithm uses a 120-bit key. The exploitation of the backdoor enables to break the cipher with around 2 Kbits of knowplaintext in a few seconds.  ...  With the rise of IoT, stream ciphers seem also to know some sort of come back.  ... 
arXiv:1903.11063v1 fatcat:7ofj6d234zdi7iqkr6m6blbf64

A Symmetric Key Cryptographic Algorithm

Ms Ayushi
2010 International Journal of Computer Applications  
The advantages of this new algorithm over the others are also explained.  ...  Any communication in the language that you and I speak-that is the human language, takes the form of plain text or clear text.  ...  Synchronous stream ciphers generate the keystream in a fashion independent of the message stream but by using the same keystream generation function at sender and receiver.  ... 
doi:10.5120/331-502 fatcat:www6vmxahfgftmnmgq3s75c5iu

Linear cryptanalysis of stream ciphers [chapter]

Jovan Dj. Golić
1995 Lecture Notes in Computer Science  
Starting from recent results on a hnear statistical weakness of keystream generators and on linear correlation properties of combiners with memory, linear cryptanalysis of stream ciphers based on the linear  ...  sequential circuit approximation of finite-state machines is introduced as a general method for assessing the strength of stream ciphers.  ...  Linear cryptanalysis of block ciphers [20] proves to be a special case of linear cryptanalysis of stream ciphers.  ... 
doi:10.1007/3-540-60590-8_13 fatcat:yirikc46lvarhomqofvko3h5jy

Using Hadamard transform for cryptanalysis of pseudo-random generators in stream ciphers

Guillermo Sosa-Gómez, Omar Rojas, Octavio Páez-Osuna
2018 EAI Endorsed Transactions on Energy Web  
used as components of stream ciphers.  ...  In this work we discuss results obtained from an application of the Hadamard transform to cryptanalysis, and in particular, we determine the probability to decipher different pseudo-random number generators  ...  In the context of our problem, the cryptanalysis of stream ciphers, the Hadamard transform will prove to be useful.  ... 
doi:10.4108/eai.13-7-2018.163980 fatcat:owcy2must5hhjkykaz72i6llfe
« Previous Showing results 1 — 15 out of 479 results