Results 51 to 60 of about 26,227 (226)
COZMO - A New Lightweight Stream Cipher [PDF]
This paper deals with the merger of the two lightweight stream ciphers – A5/1 and Trivium. The idea is to make the key stream generation more secure and to remove the attacks of the individual algorithms. The bits generated by the Trivium cipher (output) will act as the input of the A5/1 cipher.
Bonnerji, Rhea +3 more
openaire +2 more sources
Speech Encryption using Fixed Point Chaos based Stream Cipher (FPC-SC) [PDF]
Fixed point chaos based stream cipher (FPC-SC) is presented in this paper to encrypt the speech signal. Fixed point chaos based pseudo random bit generator (FPC-PRBG) is used as key sequence in stream cipher system. Two chaotic Lorenz and Chen systemsare
Fadhil S. Hasan
doaj +1 more source
Stream cipher based on quasigroup string transformations in $Z_p^*$
In this paper we design a stream cipher that uses the algebraic structure of the multiplicative group $\bbbz_p^*$ (where p is a big prime number used in ElGamal algorithm), by defining a quasigroup of order $p-1$ and by doing quasigroup string ...
Gligoroski, Danilo
core +1 more source
The chaotic Henon mapping has been proposed as a method of generating a binary sequence, the Henon sequence. Here it is proven that the subsequence 1100 never occurs in the Henon sequence, so the sequence is not a good key-stream. The distribution of other subsequences of length 4 is also illustrated. >
D. Erdmann, S. Murphy
openaire +1 more source
On the Role of the Inner State Size in Stream Ciphers [PDF]
Many modern stream ciphers consist of a keystream generator and a key schedule algorithm. In fielded systems, security of the keystream generator is often based on a large inner state rather than an inherently secure design.
Zenner, Erik
core
Numerical solvers and cryptanalysis
In this paper, we present an approach to apply numerical methods in the cryptanalysis of modern cryptographic algorithms. We focus on the stream cipher Trivium. It is a stream cipher recommended by the eStream project in the hardware category.
Lamberger Mario +2 more
doaj +1 more source
Cryptanalysis of the Vesta-2M stream cipher
The security of stream cipher Vesta-2M used in commercial products in Russia is analyzed. The size of the initial key of the keystream generator of stream cipher Vesta-2M is)2(536O.
GUAN Jie
doaj +2 more sources
Attack Stream Cipher By Using Cipher System Only
Attack stream cipher system , using cipher text only , depends on the characteristics of plain teKt language and the randomness of the key , that used in encryption , without having detailed k.nuwh:dgt:: uf cipher algorithm by benefiting
K. M. Hussein
doaj
Higher-Order Differential-Linear Cryptanalysis of ChaCha Stream Cipher
This paper studies the advanced methodologies of differential cryptanalysis with a particular emphasis on higher-order differentials and higher-order differential-linear cryptanalysis, along with their application to the ChaCha stream cipher.
Nasratullah Ghafoori, Atsuko Miyaji
doaj +1 more source

