Results 41 to 50 of about 26,227 (226)
Quantum Noise Randomized Ciphers
We review the notion of a classical random cipher and its advantages. We sharpen the usual description of random ciphers to a particular mathematical characterization suggested by the salient feature responsible for their increased security.
C. Helstrom +13 more
core +1 more source
Improved Related-Cipher Attack on Salsa20 Stream Cipher
The Salsa20 stream cipher was designed by Bernstein in 2005 as a candidate for eSTREAM and Salsa20/12 was accepted in the eSTREAM software portfolio in 2008. In this paper, we present an improved related-cipher attack on Salsa20.
Lin Ding
doaj +1 more source
A New Guess-and-Determine Attack on the A5/1 Stream Cipher [PDF]
In Europe and North America, the most widely used stream cipher to ensure privacy and confidentiality of conversations in GSM mobile phones is the A5/1. In this paper, we present a new attack on the A5/1 stream cipher with an average time complexity of 2^
Mahalanobis, Ayan, Shah, Jay
core +1 more source
PudgyTurtle Mode Resists Bit-Flipping Attacks
Cryptosystems employing a synchronous binary-additive stream cipher are susceptible to a generic attack called ’bit-flipping’, in which the ciphertext is modified to decrypt into a fraudulent message.
David A. August, Anne C. Smith
doaj +1 more source
A New Random Keys Generator Depend on Multi Techniques [PDF]
A stream cipher is a symmetric cipher which operates with a time-varying transformation onIndividual plaintext digits. By contrast, block ciphers operate with a fixed transformation on large blocks of plaintext digits.
Alaa kadhim, Hussein Abed
doaj +1 more source
A Novel Latin Square Image Cipher
In this paper, we introduce a symmetric-key Latin square image cipher (LSIC) for grayscale and color images. Our contributions to the image encryption community include 1) we develop new Latin square image encryption primitives including Latin Square ...
Aaronson +45 more
core +1 more source
Morpheus: stream cipher for software & hardware applications [PDF]
In a world where electronic devices with different characteristics are networked, privacy is an essential element for the communicating process. Privacy can be achieved by encryption algorithms with unique features based on the application that are ...
Komninos, N.
core
SUATU ALGORITMA KRIPTOGRAFI STREAM CIPHER BERDASARKAN FUNGSI CHAOS [PDF]
Salah satu sifat fungsi chaos adalah sensitif terhadap nilai awal, artinya perubahan kecil pada nilai awal akan mengakibatkan perubahan besar pada nilai fungsi selanjutnya.
Dwi, Lestari, Muhamad Zaki, Riyanto
core
SDN security control and forwarding method based on cipher identification
Aimed at the limited matching fields and the lack of effective data source authentication mechanism in the software defined networking (SDN),a SDN security control forwarding method based on cipher identification was proposed.First,the cipher ...
Xi QIN, Guodong TANG, Chaowen CHANG
doaj +2 more sources
One to One Identification of Cryptosystem Using Fisher’s Discriminant Analysis
Distiguishing analysis is an important part of cryptanalysis. It is an important content of discriminating analysis that how to identify ciphertext is encrypted by which cryptosystems when it knows only ciphertext.
Xinyi Hu, Yaqun Zhao
doaj +1 more source

