8,073 Hits in 3.3 sec

Two Generic Methods of Analyzing Stream Ciphers [chapter]

Lin Jiao, Bin Zhang, Mingsheng Wang
2015 Lecture Notes in Computer Science  
We show the power of the new methods by analyzing two stream ciphers: Grain-v1 and ACORN. Grain-v1 is one of the finalists selected in the eSTREAM project.  ...  Since the security analysis against stream ciphers becomes more difficult nowadays, it is urgent and significant to propose new generic methods.  ...  We show the power of the new methods by analyzing two additive stream ciphers as follows.  ... 
doi:10.1007/978-3-319-23318-5_21 fatcat:5bwwwikswvfprgime2bfai3g4m

Theoretical simple power analysis of the grain stream cipher

A. A. Zadeh, Howard M. Heys
2013 2013 26th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)  
In this paper, we consider the application of simple power analysis (SPA) to the Grain stream cipher.  ...  Although such attacks have been extensively applied to block ciphers, only limited research has been done to analyze their effectiveness on stream cipher hardware implementations.  ...  generator type stream ciphers comprised of multiple LFSRs.  ... 
doi:10.1109/ccece.2013.6567847 dblp:conf/ccece/ZadehH13 fatcat:7rqv4juuknfbnpyn6cm5y2rcj4

A Survey on Cryptography using Optimization algorithms in WSNs

Swapna B. Sasi, N. Sivanandam, Emeritus
2015 Indian Journal of Science and Technology  
The maximum number of keys store in the Ant Colony Optimization based key generation is 52, for Novel stream cipher cryptosystem 256, for fast and secure stream cipher 256, and also for RC4 256 keys.  ...  One of the suggested techniques is ant Colony Optimization Key Generation based image encryption method that is used to create the keys for encryption of text.  ...  Shows that the maximum number of keys stored is compared for the Ant Colony Optimization based key generation, Novel stream cipher cryptosystem, fast and secure stream cipher, RC4.  ... 
doi:10.17485/ijst/2015/v8i3/59585 fatcat:ey3ix2bfkfaszhpzmkplehuxoi

A New Algorithm for Encrypting Arabic text Using the Mathematical Equation

Basim Najim al-din, computer science department, College of education for pure sciences, University of Diyala, Saad Abdulazeez Shaban, computer science department, College of education for pure sciences, University of Diyala
2017 Diyala Journal of Engineering Sciences  
Most organizations today use two levels of security: Data security level (encryption) and Network security level (firewall) etc.  ...  As a result, this research proposed a new encryption method to encrypt Arabic text by using the principle of integration to provide better security and increasing the complexity of guessing the correct  ...  and the XOR operation used in the proposed algorithm . 3-LITERATURE REVIEW There are two types of symmetric encryption algorithm, block cipher and stream cipher; the block ciphers encrypt the plain  ... 
doi:10.24237/djes.2017.10102 fatcat:gckybd6dpve5bhdblmwhvi7gsq

Cryptanalysis of a New Stream Cipher Structure

2008 Journal of Software (Chinese)  
Cryptanalysis of a new stream cipher structure.  ...  An example is illustrated to show the effectiveness of this attack. This new attack suggests that this new stream cipher structure has potential security weakness.  ...  It is necessary to analyze the security of these candidate stream cipher structures. Distinguishing attack is a method often used in analyzing the security of stream ciphers such as Refs. [7−9] .  ... 
doi:10.3724/sp.j.1001.2008.01256 fatcat:oa7uyc3unnfntebsudcga3lrje

Deep Learning based Cryptanalysis of Stream Ciphers

Girish Mishra, Indivar Gupta, S V S S N V G Krishna Murthy, S K Pal
2021 Defence Science Journal  
Further, the authors apply the method on two more stream ciphers namely Trivium and TRIAD.  ...  The proposed method has the objective to predict the occurrence of an output bit/byte at a specific location in the stream cipher generated keystream.  ...  RC4A stream cipher uses two key components instead of using only one to generate two state arrays 1 s and 2 s by following the Key Scheduling Algorithm (KSA) of RC4.  ... 
doi:10.14429/dsj.71.16209 fatcat:gnbk3whambclxi5nfrnhhaemzy

Fault Location Identification By Machine Learning [article]

Anubhab Baksi, Santanu Sarkar, Akhilesh Siddhanti, Ravi Anand, Anupam Chattopadhyay
2020 IACR Cryptology ePrint Archive  
As a proof of concept, we take two variants of Grain-128a (namely a stream cipher, and a stream cipher with authentication), and demonstrate that machine learning can outperform correlation with the same  ...  In particular, finding the exact fault location by analysing the XORed output of a stream cipher/ stream cipher based design is somewhat non-trivial.  ...  When it comes to stream ciphers and stream cipher based designs, the usual analysis method of DFA simulation can be conceptually thought of comprised of two distinct phases.  ... 
dblp:journals/iacr/BaksiSSAC20 fatcat:w74kfulblrdhjg3od3jpsoyg2i

Analysis of a Modified RC4 Algorithm

T. D.B.Weerasinghe
2012 International Journal of Computer Applications  
General Terms Symmetric Key Algorithms, Stream Cipher, RC4 KSG, RC4 PRGA Keywords Secrecy of RC4, Modified RC4  ...  In this paper, analysis of a simply modified RC4 algorithm is presented. RC4 is the most widely used stream cipher and it is not considered as a cipher that is strong in security.  ...  RESEARCH METHOD 5.1 Method for analyzing secrecy This is done in two categories. Method for analyzing performance This is also done in two categories. With a variable key length.  ... 
doi:10.5120/8341-1617 fatcat:roc6ovcg6bgqvli5s5e66mmiye

Stream Ciphers Analysis Methods

Dominic Bucerzan, Mihaela Crăciun, Violeta Chiș, Crina Rațiu
2010 International Journal of Computers Communications & Control  
The purpose of this paper is to present and to discuss analysis methods applied in symmetric cryptography, especially on stream ciphers.  ...  The tests use standard sequence of 12.5 MB resulted from some test generators.  ...  Stream Ciphers Analysis Methods 485 This cryptosystem uses a binary additive stream cipher and two types of keys: -a short-term key named data key (DK) with a fixed length of 1024 bytes that is an input  ... 
doi:10.15837/ijccc.2010.4.2506 fatcat:ajh2wmtpcjh5hddrnkytgvnozi


Hoon Jae Lee, Il Seok Ko (Franz Ko)
2008 Cybernetics and systems  
This research was supported by the University IT Research Center Project of Korea and by the Program for Training of Graduate Students in Regional Innovation.  ...  Encryption method classified in block cipher and stream cipher .  ...  Therefore, generally, a stream cipher is much simpler and faster than a block cipher (Schneier 1996) .  ... 
doi:10.1080/01969720802257949 fatcat:cr4omk7x4nb2nnjml3khayuoje

Fault attack on FPGA implementations of Trivium stream cipher

F. E. Potestad-Ordonez, C. J. Jimenez-Fernandez, M. Valencia-Barrero
2016 2016 IEEE International Symposium on Circuits and Systems (ISCAS)  
This article presents the development of an experimental system to introduce faults in Trivium stream ciphers implemented on FPGA.  ...  The developed system has made possible to analyze the vulnerability of these implementations against fault attacks.  ...  ACKNOWLEDGMENT This work was partially supported by the Spanish Ministry of Economy and Competitiveness (with support from the European Regional Development Fund -FEDER) under contracts CITIES (TEC2010  ... 
doi:10.1109/iscas.2016.7527302 dblp:conf/iscas/Potestad-Ordonez16 fatcat:5nuu5mx72rhf5jyetqggjwaipu

Stream-keys generation based on graph labeling for strengthening Vigenere encryption

Antonius Cahya Prihandoko, Dafik Dafik, Ika Hesti Agustin
2022 International Journal of Power Electronics and Drive Systems (IJPEDS)  
As the result, most of stream-keys produced by the algorithm are random, and the implementation of the stream keys to the modified Vigenere cipher achieve good security.  ...  protocol of a modified Vigenere encryption using stream-keys and operated in cipher block chaining mode.  ...  ACKNOWLEDGEMENTS The authors wish to thank to all colleagues at the combinatorics, graph theory, and network topology (CGANT) research group, the University of Jember, Indonesia, for establishing this  ... 
doi:10.11591/ijece.v12i4.pp3960-3969 fatcat:6ns2hfi3ireprjyzerye4n5j2y

Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography [chapter]

Li Shujun, Mou Xuanqin, Cai Yuanlong
2001 Lecture Notes in Computer Science  
Finally, several examples of stream ciphers based on digital CCS-PRBG are given, and their security is discussed.  ...  As a comprehensive solution to these problems, a novel pseudo-random bit generator based on a couple of chaotic systems called CCS-PRBG is presented.  ...  would like thank the anonymous reviewers for their helpful comments, Miss Han Lu at Xi'an Foreign Language University and Miss Cao Yanghui at Xi'an Jiaotong University for their helps in the preparation of  ... 
doi:10.1007/3-540-45311-3_30 fatcat:zi4oe524rvclfbtxyg3klyxgtu

A New Lightweight Stream Cipher Based on Chaos

Lina Ding, Chunyuan Liu, Yanpeng Zhang, Qun Ding
2019 Symmetry  
A chaotic system and two Nonlinear Feadback Shift Registers (NFSRs) are used to generate a new stream cipher in this paper.  ...  completed to analyze the cipher.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/sym11070853 fatcat:gw6filhqqzdptgx3fki2mqcnw4

Evaluation of the RC4 Algorithm for Data Encryption

Allam Mousa, Ahmad Hamad
2006 International Journal of Computer Science and Applications  
Various data types were analyzed and the role of the data type was also emphasized.  ...  The results have been analyzed and interpreted as mathematical equations showing the relationship between the examined data and hence can be used to predict any future performance of the algorithm under  ...  AKNOWLEDGEMENT The authors would like to thank the anonymous reviewers for their helpful suggestions that considerably improved the quality of this paper.  ... 
dblp:journals/ijcsa/MousaH06 fatcat:es3qs2o46bemxprknshdii22si
« Previous Showing results 1 — 15 out of 8,073 results