A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Two Generic Methods of Analyzing Stream Ciphers
[chapter]
2015
Lecture Notes in Computer Science
We show the power of the new methods by analyzing two stream ciphers: Grain-v1 and ACORN. Grain-v1 is one of the finalists selected in the eSTREAM project. ...
Since the security analysis against stream ciphers becomes more difficult nowadays, it is urgent and significant to propose new generic methods. ...
We show the power of the new methods by analyzing two additive stream ciphers as follows. ...
doi:10.1007/978-3-319-23318-5_21
fatcat:5bwwwikswvfprgime2bfai3g4m
Theoretical simple power analysis of the grain stream cipher
2013
2013 26th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)
In this paper, we consider the application of simple power analysis (SPA) to the Grain stream cipher. ...
Although such attacks have been extensively applied to block ciphers, only limited research has been done to analyze their effectiveness on stream cipher hardware implementations. ...
generator type stream ciphers comprised of multiple LFSRs. ...
doi:10.1109/ccece.2013.6567847
dblp:conf/ccece/ZadehH13
fatcat:7rqv4juuknfbnpyn6cm5y2rcj4
A Survey on Cryptography using Optimization algorithms in WSNs
2015
Indian Journal of Science and Technology
The maximum number of keys store in the Ant Colony Optimization based key generation is 52, for Novel stream cipher cryptosystem 256, for fast and secure stream cipher 256, and also for RC4 256 keys. ...
One of the suggested techniques is ant Colony Optimization Key Generation based image encryption method that is used to create the keys for encryption of text. ...
Shows that the maximum number of keys stored is compared for the Ant Colony Optimization based key generation, Novel stream cipher cryptosystem, fast and secure stream cipher, RC4. ...
doi:10.17485/ijst/2015/v8i3/59585
fatcat:ey3ix2bfkfaszhpzmkplehuxoi
A New Algorithm for Encrypting Arabic text Using the Mathematical Equation
2017
Diyala Journal of Engineering Sciences
Most organizations today use two levels of security: Data security level (encryption) and Network security level (firewall) etc. ...
As a result, this research proposed a new encryption method to encrypt Arabic text by using the principle of integration to provide better security and increasing the complexity of guessing the correct ...
and the XOR operation used in the proposed algorithm .
3-LITERATURE REVIEW There are two types of symmetric encryption algorithm, block cipher and stream cipher; the block ciphers encrypt the plain ...
doi:10.24237/djes.2017.10102
fatcat:gckybd6dpve5bhdblmwhvi7gsq
Cryptanalysis of a New Stream Cipher Structure
2008
Journal of Software (Chinese)
Cryptanalysis of a new stream cipher structure. ...
An example is illustrated to show the effectiveness of this attack. This new attack suggests that this new stream cipher structure has potential security weakness. ...
It is necessary to analyze the security of these candidate stream cipher structures. Distinguishing attack is a method often used in analyzing the security of stream ciphers such as Refs. [7−9] . ...
doi:10.3724/sp.j.1001.2008.01256
fatcat:oa7uyc3unnfntebsudcga3lrje
Deep Learning based Cryptanalysis of Stream Ciphers
2021
Defence Science Journal
Further, the authors apply the method on two more stream ciphers namely Trivium and TRIAD. ...
The proposed method has the objective to predict the occurrence of an output bit/byte at a specific location in the stream cipher generated keystream. ...
RC4A stream cipher uses two key components instead of using only one to generate two state arrays 1 s and 2 s by following the Key Scheduling Algorithm (KSA) of RC4. ...
doi:10.14429/dsj.71.16209
fatcat:gnbk3whambclxi5nfrnhhaemzy
Fault Location Identification By Machine Learning
[article]
2020
IACR Cryptology ePrint Archive
As a proof of concept, we take two variants of Grain-128a (namely a stream cipher, and a stream cipher with authentication), and demonstrate that machine learning can outperform correlation with the same ...
In particular, finding the exact fault location by analysing the XORed output of a stream cipher/ stream cipher based design is somewhat non-trivial. ...
When it comes to stream ciphers and stream cipher based designs, the usual analysis method of DFA simulation can be conceptually thought of comprised of two distinct phases. ...
dblp:journals/iacr/BaksiSSAC20
fatcat:w74kfulblrdhjg3od3jpsoyg2i
Analysis of a Modified RC4 Algorithm
2012
International Journal of Computer Applications
General Terms Symmetric Key Algorithms, Stream Cipher, RC4 KSG, RC4 PRGA Keywords Secrecy of RC4, Modified RC4 ...
In this paper, analysis of a simply modified RC4 algorithm is presented. RC4 is the most widely used stream cipher and it is not considered as a cipher that is strong in security. ...
RESEARCH METHOD 5.1 Method for analyzing secrecy This is done in two categories.
Method for analyzing performance This is also done in two categories.
With a variable key length. ...
doi:10.5120/8341-1617
fatcat:roc6ovcg6bgqvli5s5e66mmiye
Stream Ciphers Analysis Methods
2010
International Journal of Computers Communications & Control
The purpose of this paper is to present and to discuss analysis methods applied in symmetric cryptography, especially on stream ciphers. ...
The tests use standard sequence of 12.5 MB resulted from some test generators. ...
Stream Ciphers Analysis Methods
485 This cryptosystem uses a binary additive stream cipher and two types of keys: -a short-term key named data key (DK) with a fixed length of 1024 bytes that is an input ...
doi:10.15837/ijccc.2010.4.2506
fatcat:ajh2wmtpcjh5hddrnkytgvnozi
AN INTELLIGENT SECURITY AGENT FOR A RELIABLE CIPHER SYSTEM USING PINGPONG
2008
Cybernetics and systems
This research was supported by the University IT Research Center Project of Korea and by the Program for Training of Graduate Students in Regional Innovation. ...
Encryption method classified in block cipher and stream cipher . ...
Therefore, generally, a stream cipher is much simpler and faster than a block cipher (Schneier 1996) . ...
doi:10.1080/01969720802257949
fatcat:cr4omk7x4nb2nnjml3khayuoje
Fault attack on FPGA implementations of Trivium stream cipher
2016
2016 IEEE International Symposium on Circuits and Systems (ISCAS)
This article presents the development of an experimental system to introduce faults in Trivium stream ciphers implemented on FPGA. ...
The developed system has made possible to analyze the vulnerability of these implementations against fault attacks. ...
ACKNOWLEDGMENT This work was partially supported by the Spanish Ministry of Economy and Competitiveness (with support from the European Regional Development Fund -FEDER) under contracts CITIES (TEC2010 ...
doi:10.1109/iscas.2016.7527302
dblp:conf/iscas/Potestad-Ordonez16
fatcat:5nuu5mx72rhf5jyetqggjwaipu
Stream-keys generation based on graph labeling for strengthening Vigenere encryption
2022
International Journal of Power Electronics and Drive Systems (IJPEDS)
As the result, most of stream-keys produced by the algorithm are random, and the implementation of the stream keys to the modified Vigenere cipher achieve good security. ...
protocol of a modified Vigenere encryption using stream-keys and operated in cipher block chaining mode. ...
ACKNOWLEDGEMENTS The authors wish to thank to all colleagues at the combinatorics, graph theory, and network topology (CGANT) research group, the University of Jember, Indonesia, for establishing this ...
doi:10.11591/ijece.v12i4.pp3960-3969
fatcat:6ns2hfi3ireprjyzerye4n5j2y
Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography
[chapter]
2001
Lecture Notes in Computer Science
Finally, several examples of stream ciphers based on digital CCS-PRBG are given, and their security is discussed. ...
As a comprehensive solution to these problems, a novel pseudo-random bit generator based on a couple of chaotic systems called CCS-PRBG is presented. ...
would like thank the anonymous reviewers for their helpful comments, Miss Han Lu at Xi'an Foreign Language University and Miss Cao Yanghui at Xi'an Jiaotong University for their helps in the preparation of ...
doi:10.1007/3-540-45311-3_30
fatcat:zi4oe524rvclfbtxyg3klyxgtu
A New Lightweight Stream Cipher Based on Chaos
2019
Symmetry
A chaotic system and two Nonlinear Feadback Shift Registers (NFSRs) are used to generate a new stream cipher in this paper. ...
completed to analyze the cipher. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/sym11070853
fatcat:gw6filhqqzdptgx3fki2mqcnw4
Evaluation of the RC4 Algorithm for Data Encryption
2006
International Journal of Computer Science and Applications
Various data types were analyzed and the role of the data type was also emphasized. ...
The results have been analyzed and interpreted as mathematical equations showing the relationship between the examined data and hence can be used to predict any future performance of the algorithm under ...
AKNOWLEDGEMENT The authors would like to thank the anonymous reviewers for their helpful suggestions that considerably improved the quality of this paper. ...
dblp:journals/ijcsa/MousaH06
fatcat:es3qs2o46bemxprknshdii22si
« Previous
Showing results 1 — 15 out of 8,073 results