Results 1 to 10 of about 3,667 (257)
Hardware optimizations of stream cipher rabbit [PDF]
ABSTRACT Stream ciphers form part of cryptographic primitives focused on privacy. Synchronous, symmetric and software-oriented stream cipher Rabbit is member of final portfolio of European Union's eStream project. Although it was designed to perform well in software, employed operations seem to compute efficiently in hardware.
Jozef Tomecek
openaire +4 more sources
A Hybrid Algorithms Based on the Aizawa Attractor and Rabbit-Lightweight Cipher for Image Encryption
Social media and networks rely heavily on images. Those images should be distributed in a private manner. Image encryption is therefore one of the most crucial components of cyber security. In the present study, an effective image encryption technique is developed that combines the Rabbit Algorithm, a simple algorithm, with the Attractor of Aizawa,
Mohammed Gheni Alwan+2 more
openaire +3 more sources
Higher-Order Countermeasures against Side-Channel Cryptanalysis on Rabbit Stream Cipher [PDF]
In this study, software-based countermeasures against a side-channel cryptanalysis of the Rabbit stream cipher were developed using Moteiv’s Tmote Sky, a popular wireless sensor mote based on the Berkeley TelosB, as the target platform. The countermeasures build upon previous work by improving mask generation, masking and hiding other components of the
Bruce Ndibanje+2 more
openaire +3 more sources
Improvement of rabbit lightweight stream cipher for image encryption using Lévy flight
The encryption of digital images plays a very important role in maintaining privacy and security, in order to protect the people, like witnesses. So, an individual image must be encrypted before it is sent over the Internet to the intended recipient. In this paper, images are encrypted using the rabbit algorithm and the chaotic equation represented by ...
Tameem Hameed Obaida+2 more
openaire +3 more sources
Rabbit: A New High-Performance Stream Cipher [PDF]
We present a new stream cipher, Rabbit, based on iterating a set of coupled non-linear functions. Rabbit is characterized by a high performance in software with a measured encryption/decryption speed of 3.7 clock cycles per byte on a Pentium III processor.
Mette Vesterager+4 more
openaire +3 more sources
Secure Portable Virtual Private Network with Rabbit Stream Cipher Algorithm
Abstract Employee mobility is an important issue for companies that have a goal to become global company. The company often asks the employees to do some assignments outside the office area, either inside or outside of their home country. A portable virtual private network (VPN) is a device that enables the employees to perform remote access ...
Rino, Nico Surantha
openaire +3 more sources
Pseudorandom number generator using Rabbit cipher [PDF]
Random Number Generators (RNGs) are applied in a wide variety of cryptographic operations such as cryptographic computer security protocols, encryption algorithms, and keystreams. Stream ciphers employ an encryption transformation which varies with time.
Eddie Shahril Ismail+2 more
openaire +2 more sources
On the security of consumer wearable devices in the Internet of Things. [PDF]
Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing.
Tahir H, Tahir R, McDonald-Maier K.
europepmc +4 more sources
Kangaroo A Proposed Stream Cipher Algorithm [PDF]
Stream cipher designers offer new algorithms by employing thecharacteristics of the basic structure to get algorithms that have advanced featuresfrom security and speed stand point of view.
Abdul-Monem S. Rahma+1 more
doaj +3 more sources
The security analysis on the rabbit stream cipher
In recent years, stream cipher systems that have been traditionally designed using linear feedback shift register have been almost entirely compromised by algebraic attack methods. Thus, identifying a method to establish concepts for new-generation ciphers, prevent existing security problems, and design new stream cipher systems that consider both ...
Kai Chain
openaire +2 more sources