Results 11 to 20 of about 15,368 (325)

Fast correlation attacks on certain stream ciphers [PDF]

open access: bronzeJournal of Cryptology, 1989
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Willi Meier, Othmar Staffelbach
openalex   +3 more sources

Differential Attacks against the Helix Stream Cipher [PDF]

open access: bronze, 2004
In this paper, we analyze the security of the stream cipher Helix, recently proposed at FSE’03. Helix is a high-speed asynchronous stream cipher, with a built-in MAC functionality. We analyze the differential properties of its keystream generator and describe two new attacks.
Frédéric Muller
openalex   +2 more sources

GENERALIZED STATISTICAL ATTACK ON SYNCRONOUS STREAM CIPHERS

open access: diamondUkrainian Information Security Research Journal, 2015
Антон Николаевич Алексейчук   +2 more
openalex   +2 more sources

PudgyTurtle Mode Resists Bit-Flipping Attacks

open access: yesCryptography, 2023
Cryptosystems employing a synchronous binary-additive stream cipher are susceptible to a generic attack called ’bit-flipping’, in which the ciphertext is modified to decrypt into a fraudulent message.
David A. August, Anne C. Smith
doaj   +1 more source

Vectorial Decoding Algorithm for Fast Correlation Attack and Its Applications to Stream Cipher Grain-128a

open access: yesIACR Transactions on Symmetric Cryptology, 2022
Fast correlation attack, pioneered by Meier and Staffelbach, is an important cryptanalysis tool for LFSR-based stream cipher, which exploits the correlation between the LFSR state and key stream and targets at recovering the initial state of LFSR via a ...
Zhaocun Zhou, Dengguo Feng, Bin Zhang
doaj   +1 more source

Cryptanalysis of Draco

open access: yesIACR Transactions on Symmetric Cryptology, 2022
Draco is a lightweight stream cipher designed by Hamann et al. in IACR ToSC 2022. It has a Grain-like structure with two state registers of size 95 and 33 bits. In addition, the cipher uses a 128-bit secret key and a 96-bit IV.
Subhadeep Banik
doaj   +1 more source

Using Evolving Algorithms to Cryptanalysis Nonlinear Cryptosystems

open access: yesمجلة بغداد للعلوم, 2020
In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack.
Riyam Noori Jawad, Faez Hassan Ali
doaj   +1 more source

Findings Annihilator(s) via Fault Injection Attack (FIA) on Boolean Function of Grain v0 [PDF]

open access: yesITM Web of Conferences, 2019
In developing stream cipher algorithms, Boolean function is one of vital elements. Attacks on LFSR-based stream cipher is the challenge for the cryptanalyst to get low-degree annihilator(s).
Ariffin Muhammad Rezal Kamel   +4 more
doaj   +1 more source

Secure Algorithms for SAKA Protocol in the GSM Network [PDF]

open access: yes, 2017
This paper deals with the security vulnerabilities of the cryptographic algorithms A3, A8, and A5 existing in the GSM network. We review these algorithms and propose new secure algorithms named NewA3, NewA8, and NewA5 algorithms with respect to the A3 ...
Chaudhari, N.S., Saxena, N.
core   +1 more source

Comparison analysis of stream cipher algorithms for digital communication [PDF]

open access: yes, 2007
The broadcast nature of radio communication such as in the HF (High Frequency) spectrum exposes the transmitted information to unauthorized third parties. Confidentiality is ensured by employing cipher system.
Mat Sidek, Abd. Rahim   +1 more
core   +1 more source

Home - About - Disclaimer - Privacy