Results 41 to 50 of about 26,227 (226)

Quantum Noise Randomized Ciphers

open access: yes, 2006
We review the notion of a classical random cipher and its advantages. We sharpen the usual description of random ciphers to a particular mathematical characterization suggested by the salient feature responsible for their increased security.
C. Helstrom   +13 more
core   +1 more source

Improved Related-Cipher Attack on Salsa20 Stream Cipher

open access: yesIEEE Access, 2019
The Salsa20 stream cipher was designed by Bernstein in 2005 as a candidate for eSTREAM and Salsa20/12 was accepted in the eSTREAM software portfolio in 2008. In this paper, we present an improved related-cipher attack on Salsa20.
Lin Ding
doaj   +1 more source

A New Guess-and-Determine Attack on the A5/1 Stream Cipher [PDF]

open access: yes, 2012
In Europe and North America, the most widely used stream cipher to ensure privacy and confidentiality of conversations in GSM mobile phones is the A5/1. In this paper, we present a new attack on the A5/1 stream cipher with an average time complexity of 2^
Mahalanobis, Ayan, Shah, Jay
core   +1 more source

PudgyTurtle Mode Resists Bit-Flipping Attacks

open access: yesCryptography, 2023
Cryptosystems employing a synchronous binary-additive stream cipher are susceptible to a generic attack called ’bit-flipping’, in which the ciphertext is modified to decrypt into a fraudulent message.
David A. August, Anne C. Smith
doaj   +1 more source

A New Random Keys Generator Depend on Multi Techniques [PDF]

open access: yesEngineering and Technology Journal, 2015
A stream cipher is a symmetric cipher which operates with a time-varying transformation onIndividual plaintext digits. By contrast, block ciphers operate with a fixed transformation on large blocks of plaintext digits.
Alaa kadhim, Hussein Abed
doaj   +1 more source

A Novel Latin Square Image Cipher

open access: yes, 2012
In this paper, we introduce a symmetric-key Latin square image cipher (LSIC) for grayscale and color images. Our contributions to the image encryption community include 1) we develop new Latin square image encryption primitives including Latin Square ...
Aaronson   +45 more
core   +1 more source

Morpheus: stream cipher for software & hardware applications [PDF]

open access: yes, 2007
In a world where electronic devices with different characteristics are networked, privacy is an essential element for the communicating process. Privacy can be achieved by encryption algorithms with unique features based on the application that are ...
Komninos, N.
core  

SUATU ALGORITMA KRIPTOGRAFI STREAM CIPHER BERDASARKAN FUNGSI CHAOS [PDF]

open access: yes, 2012
Salah satu sifat fungsi chaos adalah sensitif terhadap nilai awal, artinya perubahan kecil pada nilai awal akan mengakibatkan perubahan besar pada nilai fungsi selanjutnya.
Dwi, Lestari, Muhamad Zaki, Riyanto
core  

SDN security control and forwarding method based on cipher identification

open access: yesTongxin xuebao, 2018
Aimed at the limited matching fields and the lack of effective data source authentication mechanism in the software defined networking (SDN),a SDN security control forwarding method based on cipher identification was proposed.First,the cipher ...
Xi QIN, Guodong TANG, Chaowen CHANG
doaj   +2 more sources

One to One Identification of Cryptosystem Using Fisher’s Discriminant Analysis

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2018
Distiguishing analysis is an important part of cryptanalysis. It is an important content of discriminating analysis that how to identify ciphertext is encrypted by which cryptosystems when it knows only ciphertext.
Xinyi Hu, Yaqun Zhao
doaj   +1 more source

Home - About - Disclaimer - Privacy