Results 11 to 20 of about 15,368 (325)
Fast correlation attacks on certain stream ciphers [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Willi Meier, Othmar Staffelbach
openalex +3 more sources
Differential Attacks against the Helix Stream Cipher [PDF]
In this paper, we analyze the security of the stream cipher Helix, recently proposed at FSE’03. Helix is a high-speed asynchronous stream cipher, with a built-in MAC functionality. We analyze the differential properties of its keystream generator and describe two new attacks.
Frédéric Muller
openalex +2 more sources
GENERALIZED STATISTICAL ATTACK ON SYNCRONOUS STREAM CIPHERS
Антон Николаевич Алексейчук +2 more
openalex +2 more sources
PudgyTurtle Mode Resists Bit-Flipping Attacks
Cryptosystems employing a synchronous binary-additive stream cipher are susceptible to a generic attack called ’bit-flipping’, in which the ciphertext is modified to decrypt into a fraudulent message.
David A. August, Anne C. Smith
doaj +1 more source
Fast correlation attack, pioneered by Meier and Staffelbach, is an important cryptanalysis tool for LFSR-based stream cipher, which exploits the correlation between the LFSR state and key stream and targets at recovering the initial state of LFSR via a ...
Zhaocun Zhou, Dengguo Feng, Bin Zhang
doaj +1 more source
Draco is a lightweight stream cipher designed by Hamann et al. in IACR ToSC 2022. It has a Grain-like structure with two state registers of size 95 and 33 bits. In addition, the cipher uses a 128-bit secret key and a 96-bit IV.
Subhadeep Banik
doaj +1 more source
Using Evolving Algorithms to Cryptanalysis Nonlinear Cryptosystems
In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack.
Riyam Noori Jawad, Faez Hassan Ali
doaj +1 more source
Findings Annihilator(s) via Fault Injection Attack (FIA) on Boolean Function of Grain v0 [PDF]
In developing stream cipher algorithms, Boolean function is one of vital elements. Attacks on LFSR-based stream cipher is the challenge for the cryptanalyst to get low-degree annihilator(s).
Ariffin Muhammad Rezal Kamel +4 more
doaj +1 more source
Secure Algorithms for SAKA Protocol in the GSM Network [PDF]
This paper deals with the security vulnerabilities of the cryptographic algorithms A3, A8, and A5 existing in the GSM network. We review these algorithms and propose new secure algorithms named NewA3, NewA8, and NewA5 algorithms with respect to the A3 ...
Chaudhari, N.S., Saxena, N.
core +1 more source
Comparison analysis of stream cipher algorithms for digital communication [PDF]
The broadcast nature of radio communication such as in the HF (High Frequency) spectrum exposes the transmitted information to unauthorized third parties. Confidentiality is ensured by employing cipher system.
Mat Sidek, Abd. Rahim +1 more
core +1 more source

