Results 1 to 10 of about 33 (28)
Security analysis of linearly filtered NLFSRs [PDF]
Non-linear feedback shift register (NLFSR) ciphers are cryptographic tools of choice of the industry especially for mobile communication. Their attractive feature is a high efficiency when implemented in hardware or software. However, the main problem of
Orumiehchiha Mohammad Ali +3 more
doaj +8 more sources
Conditional differential analysis on the KATAN ciphers based on deep learning
KATAN ciphers are block ciphers using non‐linear feedback shift registers. In this study, the authors improve the results of conditional differential analysis on KATAN by using deep learning. We present a practical key recovery attack on the 97‐round KATAN32 with 215.5 data complexity and 220.5 time complexity. The attack of the 82‐round KATAN48 and 70‐
Dongdong Lin +3 more
wiley +1 more source
Improved Conditional Differential Analysis on NLFSR‐Based Block Cipher KATAN32 with MILP
In this paper, a new method for constructing a Mixed Integer Linear Programming (MILP) model on conditional differential cryptanalysis of the nonlinear feedback shift register‐ (NLFSR‐) based block ciphers is proposed, and an approach to detecting the bit with a strongly biased difference is provided.
Zhaohui Xing +3 more
wiley +1 more source
Design and Implementation of LCG-Trivium Key Stream Generator into FPGA [PDF]
This paper presents the Design and implementation into Field ProgrammableGate Array (FPGA) of a combine stream cipher and a simple linear congruential generator circuit to produce key stream.
Hilaire B, Fotsin +2 more
core +2 more sources
Optical communication is very much useful in telecommunication systems, data processing and networking. It consists of a transmitter that encodes a message into an optical signal, a channel that carries the signal to its desired destination, and a ...
core +1 more source
Randomness Generation for Secure Hardware Masking - Unrolled Trivium to the Rescue [PDF]
Masking is a prominent strategy to protect cryptographic implementations against side-channel analysis. Its popularity arises from the exponential security gains that can be achieved for (approximately) quadratic resource utilization.
Amir Moradi +5 more
core
Algebraic Key-Recovery Attacks on Reduced-Round Xoofff [PDF]
Farfalle, a permutation-based construction for building a pseudorandom function (PRF), is really versatile. It can be used for message authentication code, stream cipher, key derivation function, authenticated encryption and so on.
Lorenzo Grassi, Tingting Cui
core
Fast Near Collision Attack on the Grain v1 Stream Cipher [PDF]
Modern stream ciphers often adopt a large internal state to resist various attacks, where the cryptanalysts have to deal with a large number of variables when mounting state recovery attacks.
A Biryukov +14 more
core +1 more source
Near Collision Attack Against Grain v1 [PDF]
A near collision attack against the Grain v1 stream cipher was proposed by Zhang et al. in Eurocrypt 18. The attack uses the fact that two internal states of the stream cipher with very low hamming distance between them, produce similar keystream ...
Daniel Collins +2 more
core
Randomness Generation for Secure Hardware Masking – Unrolled Trivium to the Rescue [PDF]
Masking is a prominent strategy to protect cryptographic implementations against side-channel analysis. Its popularity arises from the exponential security gains that can be achieved for (approximately) quadratic resource utilization.
Amir Moradi +5 more
core +2 more sources

