A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Cryptanalysis of the Stream Cipher DECIM
[chapter]
2006
Lecture Notes in Computer Science
DECIM is a hardware oriented stream cipher with an 80-bit key and a 64-bit IV. In this paper, we point out two serious flaws in DECIM. One flaw is in the initialization of DECIM. ...
The amount of computation required in the attack is negligible. Another flaw is in the keystream generation algorithm of DECIM. ...
Acknowledgements The authors would like to thank the anonymous reviewers for their helpful comments. ...
doi:10.1007/11799313_3
fatcat:k4fw76x7w5fcrn7566uchh7tx4
Cryptanalysis of Stream Cipher Cryptosystem Based on Soft Computing Techniques
2017
IOSR Journal of Computer Engineering
This paper presents a new investigation for cryptanalysis stream cipher based on Genetic Algorithm(GAs), Particle Swarm Optimization (PSO).GA and PSO utilized for the automatic recovery of the key, and ...
Based on a mathematical model, it is shown that such algorithms can be used to reduce the number of trials which are needed to determine the initial state of the attacked generator using ciphertext only ...
Table (1) shows the different parameters of GA to cryptanalysis stream cipher Systems.
4.3Using PSO algorithm to cryptanalysis stream Cipher In Evaluation For the initial population, the cryptanalysis ...
doi:10.9790/0661-1901047884
fatcat:odqddbttp5cito4kdr2vph32w4
A Simple Algebraic Model based Polyalphabetic Substitution Cipher
2012
International Journal of Computer Applications
This key strengthens the cipher and it does not allow the cipher to be broken by the known plain text attack. The cryptanalysis performed clearly indicates that the cipher is a strong one. . ...
Keywords Polyalphabetic substitution, variable length key stream, bitratio test, frequency test. ...
Convert the character to their corresponding ASCII (decimal) equivalent. 6. Add 2 to the ASCII value of the character. ...
doi:10.5120/4844-7111
fatcat:l4bjnouzgbfwbcabxtrig2jckm
NON LINEAR FEEDBACK STREAM CIPHER
2012
International journal of computer and communication technology
The main aim of this paper is to develop a new generation and innovative security software for applications. We proposed new stream cipher called NLFS. ...
In synchronous mode key stream is independent of plain text and cipher text. In selfsynchronous mode key stream generation depending on cipher text. ...
Linear Cryptanalysis Linear cryptanalysis is a method to reconstruct secret key by solving linear equations of key stream generators of stream ciphers. ...
doi:10.47893/ijcct.2012.1128
fatcat:3uzhjlwx7bfaracnqigkxuiigu
Cryptanalysis of Nonlinear Stream Cipher Cryptosystem based on Improved Particle Swarm Optimization
2017
International Journal of Applied Information Systems
Stream cipher is one of the hard electronic cipher systems because of high security and difficulty in breaking it. ...
the initial state of the attacked stream cipher cryptosystem using ciphertext only attack. ...
For the GA parameters there are a set of values which are considered as the most appropriate to attacks stream cipher by GA different parameters of GA to cryptanalysis stream cipher Systems (see Table ...
doi:10.5120/ijais2017451658
fatcat:6phuaki2mffdtemzsmjkzq6glm
The State of Stream Ciphers
2009
IEICE ESS FUNDAMENTALS REVIEW
Roos, A class of weak keys in the RC4 stream cipher, Two posts in sci.crypt, 1995. 39, pp.71-76, Sept. 2007. 18 S. Fluhrer, I. Mantin, and A. ...
Preneel,
A new key stream generator MUGI, Proc. FSE2002, LNCS 2365,
pp.179-194, 2002.
5
P. Ekdahl and T. Johansson, A new version of the stream cipher
SNOW, Proc. ...
doi:10.1587/essfr.2.3_66
fatcat:nrohgmqeaffhfaq4zvj5spepie
Page 4597 of Mathematical Reviews Vol. , Issue 2002F
[page]
2002
Mathematical Reviews
Next, we derive a lower bound on the period of a [1,k] self-decimated m-sequence for 3 <k < L. Finally, we present the exact values of the bit pair frequencies of [1,2] self-decimated m-sequences. ...
Summary: “In the stability theory of stream ciphers, the philoso- phy is that a good keystream should not only have a large linear complexity, but that a small number of bit changes should not cause a ...
Secure and Fast Chaos based Encryption System using Digital Logic Circuit
2014
International Journal of Computer Network and Information Security
Cryptanalysis of the proposed algorithm shows the strength and security of algorithm and keys. ...
An avalanche effect is the attractive property of cryptography in which two different keys produce different cipher text for the same data information and also some Important properties related to chaotic ...
Today, Most of data information is transmitted in the form of a stream of bits over the internet. ...
doi:10.5815/ijcnis.2014.06.04
fatcat:yay2zaf7ubbdjmzsacl6lijv5i
Cryptanalysis of a Pseudorandom Generator for Cross-Border E-Commerce
2019
Ingénierie des Systèmes d'Information
The experimental results show that such a generalized method of cryptanalysis is feasible. ...
A method of cryptanalysis of cascades containing two such LFSRs is well known. We generalize this method to cryptanalysis of a cascade with an arbitrary number of LFSRs. ...
In this paper, we consider stream ciphers, a large class of so-called symmetric ciphers, and we concentrate on cryptanalysis of cascades of irregularly clocked LFSRs ( Figure 3 ) realized through the ...
doi:10.18280/isi.240401
fatcat:nvd3hu5qjrbmxgvx7kd2lvjdva
FPGA Based Cipher Design & Implementation of Recursive Oriented Block Arithmetic and Substitution Technique (ROBAST)
2011
International Journal of Advanced Computer Science and Applications
A block of n-bits is taken as an input stream, where n ranges from 8 to 256 -bit, then ROBAST is applied in each block to generate intermediate stream, any one intermediate stream is considered as a cipher ...
The same operation is performed repeatedly on various block sizes. It is a kind of block cipher and symmetric in nature hence decoding is done in similar manner. ...
ACKNOWLEDGMENT The authors express their deep sense of gratitude to The Department of Computer Science and Engineering, Netaji Subhash Engineering College, Garia, Kolkata, West Bengal, India and The Department ...
doi:10.14569/ijacsa.2011.020408
fatcat:isun4tf2qnbnro6blex77zepja
A Simple Linearisation of the Self-shrinking Generator
[chapter]
2015
Lecture Notes in Computer Science
Irregularly decimated generators are very simple sequence generators to be used as keystream generators in stream ciphers. ...
Nowadays stream ciphers are the fastest among the encryption procedures, thus they are performed in many practical applications. ...
The work of the first author was partially supported by Generalitat Valenciana (Spain) with reference APOSTD/2013/081 and by FAPESP with number of process 2015/07246-0. ...
doi:10.1007/978-3-319-27340-2_2
fatcat:ix6pv5qoerdrliuob42fnw7r2y
BSEA-1 - A Stream Cipher Backdooring Technique
[article]
2019
arXiv
pre-print
Considering a particular family (among all the possible ones) of backdoors, we present BSEA-1, a stream cipher algorithm which contains a design backdoor enabling an effective cryptanalysis. ...
The BSEA-1 algorithm uses a 120-bit key. The exploitation of the backdoor enables to break the cipher with around 2 Kbits of knowplaintext in a few seconds. ...
With the rise of IoT, stream ciphers seem also to know some sort of come back. ...
arXiv:1903.11063v1
fatcat:7ofj6d234zdi7iqkr6m6blbf64
A Symmetric Key Cryptographic Algorithm
2010
International Journal of Computer Applications
The advantages of this new algorithm over the others are also explained. ...
Any communication in the language that you and I speak-that is the human language, takes the form of plain text or clear text. ...
Synchronous stream ciphers generate the keystream in a fashion independent of the message stream but by using the same keystream generation function at sender and receiver. ...
doi:10.5120/331-502
fatcat:www6vmxahfgftmnmgq3s75c5iu
Linear cryptanalysis of stream ciphers
[chapter]
1995
Lecture Notes in Computer Science
Starting from recent results on a hnear statistical weakness of keystream generators and on linear correlation properties of combiners with memory, linear cryptanalysis of stream ciphers based on the linear ...
sequential circuit approximation of finite-state machines is introduced as a general method for assessing the strength of stream ciphers. ...
Linear cryptanalysis of block ciphers [20] proves to be a special case of linear cryptanalysis of stream ciphers. ...
doi:10.1007/3-540-60590-8_13
fatcat:yirikc46lvarhomqofvko3h5jy
Using Hadamard transform for cryptanalysis of pseudo-random generators in stream ciphers
2018
EAI Endorsed Transactions on Energy Web
used as components of stream ciphers. ...
In this work we discuss results obtained from an application of the Hadamard transform to cryptanalysis, and in particular, we determine the probability to decipher different pseudo-random number generators ...
In the context of our problem, the cryptanalysis of stream ciphers, the Hadamard transform will prove to be useful. ...
doi:10.4108/eai.13-7-2018.163980
fatcat:owcy2must5hhjkykaz72i6llfe
« Previous
Showing results 1 — 15 out of 479 results