Results 31 to 40 of about 47,059 (344)
Comparison analysis of stream cipher algorithms for digital communication [PDF]
The broadcast nature of radio communication such as in the HF (High Frequency) spectrum exposes the transmitted information to unauthorized third parties. Confidentiality is ensured by employing cipher system.
Mat Sidek, Abd. Rahim+1 more
core +1 more source
WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices
Lightweight cryptographic primitives are essential for securing pervasive embedded devices like RFID tags, smart cards, and wireless sensor nodes. In this paper, we present a lightweight stream cipher WG-8, which is tailored from the well-known Welch ...
Xinxin Fan+2 more
doaj +1 more source
Counter Mode Development for Block Cipher Operations [PDF]
There are two basic types of symmetric algorithms: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertext—usually of 64 bits but sometimes longer.
Ali Sagheer
doaj +1 more source
An algebraic attack on stream ciphers with application to nonlinear filter generators and WG-PRNG [PDF]
In this paper, we propose a new algebraic attack on stream ciphers. Starting from the well-known attack due to Courtois and Meier, we design an attack especially effective against nonlinear filter generators. We test it on two toy stream ciphers and we show that the level of security of one of stream ciphers submitted to the NIST competition on ...
arxiv +1 more source
Provable security against generic attacks on stream ciphers
Recent lightweight hardware-based stream cipher designs keep an external non-volatile internal state that is not part of the cipher’s hardware module. The purpose of these so-called small-state ciphers is to keep the size of the hardware and the power ...
Moch Alexander
doaj +1 more source
A Practical Attack on the MIFARE Classic [PDF]
The MIFARE Classic is the most widely used contactless smart card in the market. Its design and implementation details are kept secret by its manufacturer.
Gans, Gerhard de Koning+2 more
core +3 more sources
BLOSTREAM: A HIGH SPEED STREAM CIPHER [PDF]
Although stream ciphers are widely utilized to encrypt sensitive data at fast speeds, security concerns have led to a shift from stream to block ciphers, judging that the current technology in stream cipher is inferior to the technology of block ciphers.
ALI H. KASHMAR, EDDIE S. ISMAIL
doaj
Using Evolving Algorithms to Cryptanalysis Nonlinear Cryptosystems [PDF]
في هذا البحث، نتحرى عن استخدام الخوارزميات التطورية (EA's) لتحليل أحد أنظمة التشفير غير الخطية التي تعتمد على وحدة السجلات الزاحفة لتبادل البيانات الخطية (LFSR) باستخدام طريقة هجوم النص ...
Ali, Faez Hassan, Jawad, Riyam Noori
core +2 more sources
Strike: Stream Cipher Based on Stochastic Lightning Strike Behaviour
There is an increasing need for secure and fast encryption algorithms to support applications and communication protocols, and business models. In this paper, we present an alternative stream cipher (Strike) inspired by the stochastic behaviour of ...
Khaled Suwais, Sally Almanasra
doaj +1 more source
ストリーム暗号は高速処理に優れた暗号のクラスであり,近年の情報の大規模化・通信の高速化に伴い注目を集めている.このストリーム暗号の次世代を選定するプロジェクトeSTREAM(the ECRYPT stream cipher project)が欧州にて3年間にわたり開催され,その結果として先日七つのポートフォリオが選定された.本稿では,ストリーム暗号を概観し,特にこのeSTREAMでの成果を踏まえて,現状最も使用されているストリーム暗号であるRC4,これからのストリーム暗号であるeSTREAM暗号,そして現在ISO(International Organization for Standardization)に提案されている三つの暗号の動向について解説する.
Ryoichi Teramura, Masakatu Morii
openaire +3 more sources