Results 1 to 10 of about 20,678 (92)
Cryptanalysis of the stream cipher BEAN [PDF]
BEAN is a recent stream cipher proposal that uses Feedback with Carry Shift Registers (FCSRs) and an output function. There is a sound motivation behind the use of FCSRs in BEAN as they provide several cryptographically interesting properties. In this paper, we show that the output function is not optimal.
Ågren, Martin, Hell, Martin
openaire +3 more sources
Nonlinear Equivalence of Stream Ciphers [PDF]
In this paper we investigate nonlinear equivalence of stream ciphers over a finite field, exemplified by the pure LFSR-based filter generator over F2. We define a nonlinear equivalence class consisting of filter generators of length n that generate a binary keystream of period dividing 2n-1, and investigate certain cryptographic properties of the ...
Rønjom, Sondre, Cid, Carlos
openaire +8 more sources
Comparison analysis of stream cipher algorithms for digital communication [PDF]
The broadcast nature of radio communication such as in the HF (High Frequency) spectrum exposes the transmitted information to unauthorized third parties. Confidentiality is ensured by employing cipher system.
Mat Sidek, Abd. Rahim+1 more
core +1 more source
A Practical Attack on the MIFARE Classic [PDF]
The MIFARE Classic is the most widely used contactless smart card in the market. Its design and implementation details are kept secret by its manufacturer.
Gans, Gerhard de Koning+2 more
core +3 more sources
Secure Algorithms for SAKA Protocol in the GSM Network [PDF]
This paper deals with the security vulnerabilities of the cryptographic algorithms A3, A8, and A5 existing in the GSM network. We review these algorithms and propose new secure algorithms named NewA3, NewA8, and NewA5 algorithms with respect to the A3 ...
Chaudhari, N.S., Saxena, N.
core +1 more source
A fast and light stream cipher for smartphones [PDF]
We present a stream cipher based on a chaotic dynamical system. Using a chaotic trajectory sampled under certain rules in order to avoid any attempt to reconstruct the original one, we create a binary pseudo-random keystream that can only be exactly ...
Baptista, Murilo+2 more
core +1 more source
Application of a MEMS-based TRNG in a chaotic stream cipher [PDF]
In this work, we used a sensor-based True Random Number Generator in order to generate keys for a stream cipher based on a recently published hybrid algorithm mixing Skew Tent Map and a Linear Feedback Shift Register.
Celma, Santiago+3 more
core +2 more sources
Cryptanalysis of a family of self-synchronizing chaotic stream ciphers [PDF]
Unimodal maps have been broadly used as a base of new encryption strategies. Recently, a stream cipher has been proposed in the literature, whose keystream is basically a symbolic sequence of the (one-parameter) logistic map or of the tent map.
Alvarez, Gonzalo+3 more
core +2 more sources
ストリーム暗号は高速処理に優れた暗号のクラスであり,近年の情報の大規模化・通信の高速化に伴い注目を集めている.このストリーム暗号の次世代を選定するプロジェクトeSTREAM(the ECRYPT stream cipher project)が欧州にて3年間にわたり開催され,その結果として先日七つのポートフォリオが選定された.本稿では,ストリーム暗号を概観し,特にこのeSTREAMでの成果を踏まえて,現状最も使用されているストリーム暗号であるRC4,これからのストリーム暗号であるeSTREAM暗号,そして現在ISO(International Organization for Standardization)に提案されている三つの暗号の動向について解説する.
Ryoichi Teramura, Masakatu Morii
openaire +3 more sources
Rethinking the Weakness of Stream Ciphers and Its Application to Encrypted Malware Detection [PDF]
Encryption key use is a critical component to the security of a stream cipher: because many implementations simply consist of a key scheduling algorithm and logical exclusive or (XOR), an attacker can completely break the cipher by XORing two ciphertexts
Son, Junggab, Stone, William T.
core +1 more source