Results 11 to 20 of about 25,616 (323)
Towards Low Energy Stream Ciphers
Energy optimization is an important design aspect of lightweight cryptography. Since low energy ciphers drain less battery, they are invaluable components of devices that operate on a tight energy budget such as handheld devices or RFID tags.
Subhadeep Banik +7 more
doaj +6 more sources
Improvement Majority Function in A5/1 stream cipher Algorithm [PDF]
Security is an important issue, especially in today’s technologically advanced society. Global System for Mobile Communications (GSM) is a world-wide standard for digital wireless communication.
Hala Bahjat, Mohanad Ali
doaj +1 more source
Authenticated Encryption Scheme of Self-synchronous-like ZUC Algorithm [PDF]
Aiming at the security,efficiency and lightweight requirements of authentication encryption of ZUC algorithm,this paper proposes a kind of self-synchronous-like ZUC algorithm for associated data authentication encryption scheme ZUCAE.By improving the ...
XU Rui, PENG Changgen, XU Dequan
doaj +1 more source
A Modification on Key Stream Generator for RC4 Algorithm [PDF]
Rivest Cipher 4 (RC4) is one of most common stream cipher, but it experience many problem, such as, there is little combination between the plaintext and cipher-text. For this reason RC4 Cipher is vulnerable to a number of attacks.
Suhad Kareem, Abdul Monem Rahma
doaj +1 more source
Proposed Hybrid Approach of Stream Cipher base on Selector of Encryption operation and Key Symmetric translate [PDF]
A stream cipher is a method of encrypting text (to produce cipher text) in which a cryptographic key and algorithm are applied to each binary digit in a data stream, one bit at a time. This method is not much used in modern cryptography.
Alaa Kadim Farhan
doaj +1 more source
NOCAS : A Nonlinear Cellular Automata Based Stream Cipher [PDF]
LFSR and NFSR are the basic building blocks in almost all the state of the art stream ciphers like Trivium and Grain-128. However, a number of attacks are mounted on these type of ciphers.
Sandip Karmakar, Dipanwita Roy Chowdhury
doaj +1 more source
COUNTER MODE DEVELOPMENT FOR BLOCK CIPHER OPERATIONS [PDF]
There are two basic types of symmetric cipher: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertext—usually of 64 bits but sometimes longer. Stream ciphers operate on streams of plaintext and ciphertext one bit or
Ali M. Sagheer, Ahmed T. Suod
doaj +1 more source
Using Evolving Algorithms to Cryptanalysis Nonlinear Cryptosystems
In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack.
Riyam Noori Jawad, Faez Hassan Ali
doaj +1 more source
Atom: A Stream Cipher with Double Key Filter
It has been common knowledge that for a stream cipher to be secure against generic TMD tradeoff attacks, the size of its internal state in bits needs to be at least twice the size of the length of its secret key.
Subhadeep Banik +6 more
doaj +1 more source

