Results 31 to 40 of about 1,077 (159)

A New Random Keys Generator Depend on Multi Techniques [PDF]

open access: yesEngineering and Technology Journal, 2015
A stream cipher is a symmetric cipher which operates with a time-varying transformation onIndividual plaintext digits. By contrast, block ciphers operate with a fixed transformation on large blocks of plaintext digits.
Alaa kadhim, Hussein Abed
doaj   +1 more source

SDN security control and forwarding method based on cipher identification

open access: yesTongxin xuebao, 2018
Aimed at the limited matching fields and the lack of effective data source authentication mechanism in the software defined networking (SDN),a SDN security control forwarding method based on cipher identification was proposed.First,the cipher ...
Xi QIN, Guodong TANG, Chaowen CHANG
doaj   +2 more sources

One to One Identification of Cryptosystem Using Fisher’s Discriminant Analysis

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2018
Distiguishing analysis is an important part of cryptanalysis. It is an important content of discriminating analysis that how to identify ciphertext is encrypted by which cryptosystems when it knows only ciphertext.
Xinyi Hu, Yaqun Zhao
doaj   +1 more source

COZMO - A New Lightweight Stream Cipher [PDF]

open access: yes2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT), 2017
This paper deals with the merger of the two lightweight stream ciphers – A5/1 and Trivium. The idea is to make the key stream generation more secure and to remove the attacks of the individual algorithms. The bits generated by the Trivium cipher (output) will act as the input of the A5/1 cipher.
Bonnerji, Rhea   +3 more
openaire   +2 more sources

Implementation of super H-antimagic total graph on establishing stream cipher

open access: yesIndonesian Journal of Combinatorics, 2019
This paper is aimed to study the use of super (a, d)-H antimagic total graph on generating encryption keys that can be used to establish a stream cipher. Methodology to achieve this goal was undertaken in three steps. First of all the existence of super (
Antonius Cahya Prihandoko   +2 more
doaj   +1 more source

Hénon stream cipher

open access: yesElectronics Letters, 1992
The chaotic Henon mapping has been proposed as a method of generating a binary sequence, the Henon sequence. Here it is proven that the subsequence 1100 never occurs in the Henon sequence, so the sequence is not a good key-stream. The distribution of other subsequences of length 4 is also illustrated. >
D. Erdmann, S. Murphy
openaire   +1 more source

Numerical solvers and cryptanalysis

open access: yesJournal of Mathematical Cryptology, 2009
In this paper, we present an approach to apply numerical methods in the cryptanalysis of modern cryptographic algorithms. We focus on the stream cipher Trivium. It is a stream cipher recommended by the eStream project in the hardware category.
Lamberger Mario   +2 more
doaj   +1 more source

Cryptanalysis of the Vesta-2M stream cipher

open access: yesTongxin xuebao, 2003
The security of stream cipher Vesta-2M used in commercial products in Russia is analyzed. The size of the initial key of the keystream generator of stream cipher Vesta-2M is)2(536O.
GUAN Jie
doaj   +2 more sources

Attack Stream Cipher By Using Cipher System Only

open access: yesIbn Al-Haitham Journal for Pure and Applied Sciences, 2017
Attack  stream  cipher  system  , using cipher  text only  , depends on the  characteristics of  plain  teKt language  and  the randomness of  the key , that used  in encryption , without  having detailed  k.nuwh:dgt:: uf cipher algorithm by benefiting  
K. M. Hussein
doaj  

Higher-Order Differential-Linear Cryptanalysis of ChaCha Stream Cipher

open access: yesIEEE Access
This paper studies the advanced methodologies of differential cryptanalysis with a particular emphasis on higher-order differentials and higher-order differential-linear cryptanalysis, along with their application to the ChaCha stream cipher.
Nasratullah Ghafoori, Atsuko Miyaji
doaj   +1 more source

Home - About - Disclaimer - Privacy