Results 1 to 10 of about 15,368 (325)

Improved Related-Cipher Attack on Salsa20 Stream Cipher [PDF]

open access: goldIEEE Access, 2019
The Salsa20 stream cipher was designed by Bernstein in 2005 as a candidate for eSTREAM and Salsa20/12 was accepted in the eSTREAM software portfolio in 2008. In this paper, we present an improved related-cipher attack on Salsa20.
Lin Ding
doaj   +3 more sources

A practical key recovery attack on the lightweight WG-5 stream cipher [PDF]

open access: goldHeliyon
WG-5 is a lightweight stream cipher proposed for usage in the resource-constrained devices, e.g., passive RFID tags, industrial controllers, contactless smart cards and sensors.
Lin Ding   +5 more
doaj   +4 more sources

Differential Attacks against Stream Cipher ZUC [PDF]

open access: bronze, 2012
Stream cipher ZUC is the core component in the 3GPP confidentiality and integrity algorithms 128-EEA3 and 128-EIA3. In this paper, we present the details of our differential attacks against ZUC 1.4. The vulnerability in ZUC 1.4 is due to the non-injective property in the initialization, which results in the difference in the initialization vector being
Hongjun Wu   +4 more
openalex   +3 more sources

Differential-Linear Attacks Against the Stream Cipher Phelix [PDF]

open access: bronze, 2007
The previous key recovery attacks against Helix obtain the key with about 288 operations using chosen nonces (reusing nonce) and about 1000 adaptively chosen plaintext words (or 235.6 chosen plaintext words). The stream cipher Phelix is the strengthened version of Helix. In this paper we apply the differential-linear cryptanalysis to recover the key of
Hongjun Wu, Bart Preneel
  +5 more sources

Slide attacks on the Sfinks stream cipher [PDF]

open access: green2012 6th International Conference on Signal Processing and Communication Systems, 2012
Sfinks is a shift register based stream cipher designed for hardware implementation and submitted to the eSTREAM project. In this paper, we analyse the initialisation process of Sfinks. We demonstrate a slid property of the loaded state of the Sfinks cipher, where multiple key-IV pairs may produce phase shifted keystream sequences.
Ali Alhamdan   +4 more
openalex   +4 more sources

Side Channel Attack On Stream Ciphers: A Three-Step Approach To State/Key Recovery

open access: diamondTransactions on Cryptographic Hardware and Embedded Systems, 2022
Side Channel Attack (SCA) exploits the physical information leakage (such as electromagnetic emanation) from a device that performs some cryptographic operation and poses a serious threat in the present IoT era. In the last couple of decades, there have
Satyam Kumar   +6 more
doaj   +3 more sources

RC4 stream cipher and possible attacks on WEP [PDF]

open access: hybridInternational Journal of Advanced Computer Science and Applications, 2012
In this paper we analyze and present some weaknesses and possible attacks on the RC4 stream cipher which were published in many journals. We review some advantages and disadvantages which come from several authors, as well as similarities and differences which can be observed in the published results. Also, we analyze the Key Scheduling Algorithm (KSA)
Lazar Stоšić, Milena Bogdanović
openalex   +2 more sources

Linearisation Attacks on FCSR-based Stream Ciphers

open access: bronzeInternational Journal for Information Security Research, 2012
This paper presents a new class of cryptanalytic attacks, which are applicable against those binary additive synchronous stream ciphers, whose analysis theory is based on the properties of 2-adic numbers. These attacks are named as ‘Linearisation Attacks’.
Arshad Ali
openalex   +2 more sources

Distinguishing Attacks on the Stream Cipher Py [PDF]

open access: bronze, 2006
The stream cipher Py designed by Biham and Seberry is a submission to the ECRYPT stream cipher competition. The cipher is based on two large arrays (one is 256 bytes and the other is 1040 bytes) and it is designed for high speed software applications (Py is more than 2.5 times faster than the RC4 on Pentium III).
Souradyuti Paul   +2 more
openalex   +3 more sources

Attack Stream Cipher By Using Cipher System Only

open access: yesIbn Al-Haitham Journal for Pure and Applied Sciences, 2017
Attack  stream  cipher  system  , using cipher  text only  , depends on the  characteristics of  plain  teKt language  and  the randomness of  the key , that used  in encryption , without  having detailed  k.nuwh:dgt:: uf cipher algorithm by benefiting  
K. M. Hussein
doaj   +1 more source

Home - About - Disclaimer - Privacy