Results 1 to 10 of about 479,621 (236)

A Hybrid Algorithms Based on the Aizawa Attractor and Rabbit-Lightweight Cipher for Image Encryption

open access: goldIraqi Journal of Science, 2023
     Social media and networks rely heavily on images. Those images should be distributed in a private manner. Image encryption is therefore one of the most crucial components of cyber security. In the present study, an effective image encryption technique is developed that combines the Rabbit Algorithm, a simple algorithm, with the Attractor of Aizawa,
Mohammed Gheni Alwan   +2 more
semanticscholar   +4 more sources

Improvement of rabbit lightweight stream cipher for image encryption using Lévy flight

open access: goldInternational journal of health sciences, 2022
The encryption of digital images plays a very important role in maintaining privacy and security, in order to protect the people, like witnesses. So, an individual image must be encrypted before it is sent over the Internet to the intended recipient. In this paper, images are encrypted using the rabbit algorithm and the chaotic equation represented by ...
Tameem Hameed Obaida   +2 more
semanticscholar   +4 more sources

Higher-Order Countermeasures against Side-Channel Cryptanalysis on Rabbit Stream Cipher [PDF]

open access: bronzeJournal of information and communication convergence engineering, 2014
In this study, software-based countermeasures against a side-channel cryptanalysis of the Rabbit stream cipher were developed using Moteiv’s Tmote Sky, a popular wireless sensor mote based on the Berkeley TelosB, as the target platform. The countermeasures build upon previous work by improving mask generation, masking and hiding other components of the
Bruce Ndibanje   +2 more
semanticscholar   +4 more sources

Secure Portable Virtual Private Network with Rabbit Stream Cipher Algorithm

open access: goldProcedia Computer Science, 2018
Abstract Employee mobility is an important issue for companies that have a goal to become global company. The company often asks the employees to do some assignments outside the office area, either inside or outside of their home country. A portable virtual private network (VPN) is a device that enables the employees to perform remote access ...
Rino, Nico Surantha
semanticscholar   +4 more sources

Hardware optimizations of stream cipher rabbit [PDF]

open access: hybridTatra Mountains Mathematical Publications, 2011
ABSTRACT Stream ciphers form part of cryptographic primitives focused on privacy. Synchronous, symmetric and software-oriented stream cipher Rabbit is member of final portfolio of European Union's eStream project. Although it was designed to perform well in software, employed operations seem to compute effi­ciently in hardware.
Jozef Tomecek
semanticscholar   +5 more sources

Rabbit: A New High-Performance Stream Cipher [PDF]

open access: bronzeFast Software Encryption Workshop, 2003
We present a new stream cipher, Rabbit, based on iterating a set of coupled non-linear functions. Rabbit is characterized by a high performance in software with a measured encryption/decryption speed of 3.7 clock cycles per byte on a Pentium III processor.
Mette Vesterager   +4 more
semanticscholar   +4 more sources

A Description of the Rabbit Stream Cipher Algorithm [PDF]

open access: bronzeRequest for Comments, 2006
This document describes the encryption algorithm Rabbit. It is a stream cipher algorithm with a 128-bit key and 64-bit initialization vector (IV). The method was published in 2003 and has been subject to public security and performance revision. Its high
M. Boesgaard, M. Vesterager, E. Zenner
semanticscholar   +3 more sources

Pseudorandom number generator using Rabbit cipher [PDF]

open access: closedApplied Mathematical Sciences, 2015
Random Number Generators (RNGs) are applied in a wide variety of cryptographic operations such as cryptographic computer security protocols, encryption algorithms, and keystreams. Stream ciphers employ an encryption transformation which varies with time.
Eddie Shahril Ismail   +2 more
semanticscholar   +3 more sources

The security analysis on the rabbit stream cipher

open access: bronzeInternational Journal on Information Technologies and Security
In recent years, stream cipher systems that have been traditionally designed using linear feedback shift register have been almost entirely compromised by algebraic attack methods. Thus, identifying a method to establish concepts for new-generation ciphers, prevent existing security problems, and design new stream cipher systems that consider both ...
Kai Chain
semanticscholar   +3 more sources

Hardware Framework for the Rabbit Stream Cipher [PDF]

open access: closedConference on Information Security and Cryptology, 2010
Rabbit is a software-oriented synchronous stream cipher with very strong security properties and support for 128-bit keys. Rabbit is part of the European Union's eSTREAM portfolio of stream ciphers addressing the need for strong and computationally efficient (i.e., fast) ciphers. Extensive cryptanalysis confirms Rabbit's strength against modern attacks;
Deian Stefan
semanticscholar   +3 more sources

Home - About - Disclaimer - Privacy