Results 1 to 10 of about 28,850 (320)

Improved Related-Cipher Attack on Salsa20 Stream Cipher [PDF]

open access: goldIEEE Access, 2019
The Salsa20 stream cipher was designed by Bernstein in 2005 as a candidate for eSTREAM and Salsa20/12 was accepted in the eSTREAM software portfolio in 2008. In this paper, we present an improved related-cipher attack on Salsa20.
Lin Ding
doaj   +4 more sources

Fault Attacks on the Authenticated Encryption Stream Cipher MORUS [PDF]

open access: goldCryptography, 2018
This paper investigates the application of fault attacks to the authenticated encryption stream cipher algorithm MORUS. We propose fault attacks on MORUS with two different goals: one to breach the confidentiality component, and the other to breach the ...
Iftekhar Salam   +4 more
doaj   +7 more sources

An algebraic attack to the Bluetooth stream cipher E0 [PDF]

open access: greenFinite Fields and Their Applications, 2022
In this paper we study the security of the Bluetooth stream cipher E0 from the viewpoint it is a "difference stream cipher", that is, it is defined by a system of explicit difference equations over the finite field GF(2). This approach highlights some issues of the Bluetooth encryption such as the invertibility of its state transition map, a special ...
Roberto La Scala   +3 more
semanticscholar   +8 more sources

A practical key recovery attack on the lightweight WG-5 stream cipher [PDF]

open access: goldHeliyon
WG-5 is a lightweight stream cipher proposed for usage in the resource-constrained devices, e.g., passive RFID tags, industrial controllers, contactless smart cards and sensors.
Lin Ding   +5 more
doaj   +4 more sources

Algebraic Attacks on Stream Ciphers with Linear Feedback [PDF]

open access: bronze, 2003
A classical construction of stream ciphers is to combine several LFSRs and a highly non-linear Boolean function f. Their security is usually analysed in terms of correlation attacks, that can be seen as solving a system of multivariate linear equations, true with some probability.
Nicolas T. Courtois, Willi Meier
openalex   +3 more sources

Vectorial Decoding Algorithm for Fast Correlation Attack and Its Applications to Stream Cipher Grain-128a

open access: diamondIACR Transactions on Symmetric Cryptology, 2022
Fast correlation attack, pioneered by Meier and Staffelbach, is an important cryptanalysis tool for LFSR-based stream cipher, which exploits the correlation between the LFSR state and key stream and targets at recovering the initial state of LFSR via a ...
Zhaocun Zhou, Dengguo Feng, Bin Zhang
doaj   +3 more sources

Distinguishing Attacks on the Stream Cipher Py [PDF]

open access: bronze, 2006
The stream cipher Py designed by Biham and Seberry is a submission to the ECRYPT stream cipher competition. The cipher is based on two large arrays (one is 256 bytes and the other is 1040 bytes) and it is designed for high speed software applications (Py is more than 2.5 times faster than the RC4 on Pentium III).
Souradyuti Paul   +2 more
openalex   +4 more sources

Fast Correlation Attacks on Stream Ciphers [PDF]

open access: bronze, 1988
A common type of running key generator employed in stream cipher systems consists of n (mostly maximum-length) binary linear feedback shift registers (LFSR's) whose output sequences are combined by a nonlinear Boolean function f. The output of several combining functions previously proposed in the literature is known to be correlated to some input ...
Willi Meier, Othmar Staffelbach
openalex   +3 more sources

RC4 stream cipher and possible attacks on WEP [PDF]

open access: hybridInternational Journal of Advanced Computer Science and Applications, 2012
In this paper we analyze and present some weaknesses and possible attacks on the RC4 stream cipher which were published in many journals. We review some advantages and disadvantages which come from several authors, as well as similarities and differences which can be observed in the published results. Also, we analyze the Key Scheduling Algorithm (KSA)
Lazar Stоšić, Milena Bogdanović
openalex   +3 more sources

Stream/block ciphers, difference equations and algebraic attacks [PDF]

open access: greenJournal of Symbolic Computation, 2021
26 pages, to appear in Journal of Symbolic ...
Roberto La Scala, Sharwan K. Tiwari
openalex   +5 more sources

Home - About - Disclaimer - Privacy