Results 1 to 10 of about 33 (28)

Security analysis of linearly filtered NLFSRs [PDF]

open access: yesJournal of Mathematical Cryptology, 2013
Non-linear feedback shift register (NLFSR) ciphers are cryptographic tools of choice of the industry especially for mobile communication. Their attractive feature is a high efficiency when implemented in hardware or software. However, the main problem of
Orumiehchiha Mohammad Ali   +3 more
doaj   +8 more sources

Conditional differential analysis on the KATAN ciphers based on deep learning

open access: yesIET Information Security, Volume 17, Issue 3, Page 347-359, May 2023., 2023
KATAN ciphers are block ciphers using non‐linear feedback shift registers. In this study, the authors improve the results of conditional differential analysis on KATAN by using deep learning. We present a practical key recovery attack on the 97‐round KATAN32 with 215.5 data complexity and 220.5 time complexity. The attack of the 82‐round KATAN48 and 70‐
Dongdong Lin   +3 more
wiley   +1 more source

Improved Conditional Differential Analysis on NLFSR‐Based Block Cipher KATAN32 with MILP

open access: yesWireless Communications and Mobile Computing, Volume 2020, Issue 1, 2020., 2020
In this paper, a new method for constructing a Mixed Integer Linear Programming (MILP) model on conditional differential cryptanalysis of the nonlinear feedback shift register‐ (NLFSR‐) based block ciphers is proposed, and an approach to detecting the bit with a strongly biased difference is provided.
Zhaohui Xing   +3 more
wiley   +1 more source

Design and Implementation of LCG-Trivium Key Stream Generator into FPGA [PDF]

open access: yes, 2018
This paper presents the Design and implementation into Field ProgrammableGate Array (FPGA) of a combine stream cipher and a simple linear congruential generator circuit to produce key stream.
Hilaire B, Fotsin   +2 more
core   +2 more sources

Optical Communication [PDF]

open access: yes, 2021
Optical communication is very much useful in telecommunication systems, data processing and networking. It consists of a transmitter that encodes a message into an optical signal, a channel that carries the signal to its desired destination, and a ...

core   +1 more source

Randomness Generation for Secure Hardware Masking - Unrolled Trivium to the Rescue [PDF]

open access: yes, 2023
Masking is a prominent strategy to protect cryptographic implementations against side-channel analysis. Its popularity arises from the exponential security gains that can be achieved for (approximately) quadratic resource utilization.
Amir Moradi   +5 more
core  

Algebraic Key-Recovery Attacks on Reduced-Round Xoofff [PDF]

open access: yes, 2020
Farfalle, a permutation-based construction for building a pseudorandom function (PRF), is really versatile. It can be used for message authentication code, stream cipher, key derivation function, authenticated encryption and so on.
Lorenzo Grassi, Tingting Cui
core  

Fast Near Collision Attack on the Grain v1 Stream Cipher [PDF]

open access: yes, 2018
Modern stream ciphers often adopt a large internal state to resist various attacks, where the cryptanalysts have to deal with a large number of variables when mounting state recovery attacks.
A Biryukov   +14 more
core   +1 more source

Near Collision Attack Against Grain v1 [PDF]

open access: yes, 2023
A near collision attack against the Grain v1 stream cipher was proposed by Zhang et al. in Eurocrypt 18. The attack uses the fact that two internal states of the stream cipher with very low hamming distance between them, produce similar keystream ...
Daniel Collins   +2 more
core  

Randomness Generation for Secure Hardware Masking – Unrolled Trivium to the Rescue [PDF]

open access: yes
Masking is a prominent strategy to protect cryptographic implementations against side-channel analysis. Its popularity arises from the exponential security gains that can be achieved for (approximately) quadratic resource utilization.
Amir Moradi   +5 more
core   +2 more sources

Home - About - Disclaimer - Privacy