Results 1 to 10 of about 479,621 (236)
A Hybrid Algorithms Based on the Aizawa Attractor and Rabbit-Lightweight Cipher for Image Encryption
Iraqi Journal of Science, 2023Social media and networks rely heavily on images. Those images should be distributed in a private manner. Image encryption is therefore one of the most crucial components of cyber security. In the present study, an effective image encryption technique is developed that combines the Rabbit Algorithm, a simple algorithm, with the Attractor of Aizawa,
Mohammed Gheni Alwan+2 more
semanticscholar +4 more sources
Improvement of rabbit lightweight stream cipher for image encryption using Lévy flight
International journal of health sciences, 2022The encryption of digital images plays a very important role in maintaining privacy and security, in order to protect the people, like witnesses. So, an individual image must be encrypted before it is sent over the Internet to the intended recipient. In this paper, images are encrypted using the rabbit algorithm and the chaotic equation represented by ...
Tameem Hameed Obaida+2 more
semanticscholar +4 more sources
Higher-Order Countermeasures against Side-Channel Cryptanalysis on Rabbit Stream Cipher [PDF]
Journal of information and communication convergence engineering, 2014In this study, software-based countermeasures against a side-channel cryptanalysis of the Rabbit stream cipher were developed using Moteiv’s Tmote Sky, a popular wireless sensor mote based on the Berkeley TelosB, as the target platform. The countermeasures build upon previous work by improving mask generation, masking and hiding other components of the
Bruce Ndibanje+2 more
semanticscholar +4 more sources
Secure Portable Virtual Private Network with Rabbit Stream Cipher Algorithm
Procedia Computer Science, 2018Abstract Employee mobility is an important issue for companies that have a goal to become global company. The company often asks the employees to do some assignments outside the office area, either inside or outside of their home country. A portable virtual private network (VPN) is a device that enables the employees to perform remote access ...
Rino, Nico Surantha
semanticscholar +4 more sources
Hardware optimizations of stream cipher rabbit [PDF]
Tatra Mountains Mathematical Publications, 2011ABSTRACT Stream ciphers form part of cryptographic primitives focused on privacy. Synchronous, symmetric and software-oriented stream cipher Rabbit is member of final portfolio of European Union's eStream project. Although it was designed to perform well in software, employed operations seem to compute efficiently in hardware.
Jozef Tomecek
semanticscholar +5 more sources
Rabbit: A New High-Performance Stream Cipher [PDF]
Fast Software Encryption Workshop, 2003We present a new stream cipher, Rabbit, based on iterating a set of coupled non-linear functions. Rabbit is characterized by a high performance in software with a measured encryption/decryption speed of 3.7 clock cycles per byte on a Pentium III processor.
Mette Vesterager+4 more
semanticscholar +4 more sources
A Description of the Rabbit Stream Cipher Algorithm [PDF]
Request for Comments, 2006This document describes the encryption algorithm Rabbit. It is a stream cipher algorithm with a 128-bit key and 64-bit initialization vector (IV). The method was published in 2003 and has been subject to public security and performance revision. Its high
M. Boesgaard, M. Vesterager, E. Zenner
semanticscholar +3 more sources
Pseudorandom number generator using Rabbit cipher [PDF]
Applied Mathematical Sciences, 2015Random Number Generators (RNGs) are applied in a wide variety of cryptographic operations such as cryptographic computer security protocols, encryption algorithms, and keystreams. Stream ciphers employ an encryption transformation which varies with time.
Eddie Shahril Ismail+2 more
semanticscholar +3 more sources
The security analysis on the rabbit stream cipher
International Journal on Information Technologies and SecurityIn recent years, stream cipher systems that have been traditionally designed using linear feedback shift register have been almost entirely compromised by algebraic attack methods. Thus, identifying a method to establish concepts for new-generation ciphers, prevent existing security problems, and design new stream cipher systems that consider both ...
Kai Chain
semanticscholar +3 more sources
Hardware Framework for the Rabbit Stream Cipher [PDF]
Conference on Information Security and Cryptology, 2010Rabbit is a software-oriented synchronous stream cipher with very strong security properties and support for 128-bit keys. Rabbit is part of the European Union's eSTREAM portfolio of stream ciphers addressing the need for strong and computationally efficient (i.e., fast) ciphers. Extensive cryptanalysis confirms Rabbit's strength against modern attacks;
Deian Stefan
semanticscholar +3 more sources