Results 261 to 270 of about 28,850 (320)
Fault Attacks on Stream Ciphers [PDF]
In this chapter, we provide an outlook on fault attack techniques aimed at breaking stream ciphers. The chapter will start with an overview of the possible targets for fault attacks among this class of encryption algorithms, and subsequently provide two in-depth case studies on enhancing impossible cryptanalysis against RC4 and differential ...
Alessandro Barenghi, Elena Trichina
openaire +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Side-Channel Attack on the A5/1 Stream Cipher
Euromicro Symposium on Digital Systems Design, 2019In this paper we present cryptanalysis of the A5/1 stream cipher used in GSM mobile phones. Our attack is based on power analysis where we assume that the power consumption while clocking 3 LFSRs is different than when clocking 2 LFSRs.
M. Jureček, J. Bucek, R. Lórencz
semanticscholar +1 more source
New correlation attacks on stream ciphers
IEEE AFRICON. 6th Africon Conference in Africa,, 2003We introduce two new correlation attacks on stream ciphers that make use of non-linearly combined linear feedback shift-registers (LFSRs). The first attack utilises the well-known Lempel-Ziv complexity measure for binary sequences. The second attack is based on the binary derivative, applied in conjunction with the distribution of runs in a binary ...
C. Bruwer, W.T. Penzhorn
openaire +2 more sources
Distinguishing Attack on SN3 Stream Cipher
2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2008SN3 is a synchronous stream cipher uses keys up to 768-byte. The cipher is constructed as an array base generator in which each key stream word can be considered as a linear combination of some array contents. While the cipher has not been analyzed yet, we show that there is a significance correlation between output key streams and by using this result
M.A. Orumiehchi, S.F. Mohebbipoor
openaire +2 more sources
Correlation attacks on stream ciphers
Proceedings of IEEE. AFRICON '96, 2002The fast correlation attack described by Meier and Staffelbach (1989) on certain classes of stream ciphers, based on linear feedback shift registers, requires that the number of taps of the characteristic polynomial must be small-typically less than 10.
openaire +2 more sources
An overview of distinguishing attacks on stream ciphers
Cryptography and Communications, 2008This paper overviews basic theory on distinguishing attacks on stream ciphers. It illustrates underlying ideas and common techniques without going into too many details on each topic. Some new approaches in distinguishing attacks are also included.
Lennart Brynielsson +2 more
openaire +1 more source
Linear Attacks on Stream Ciphers
2011This paper is a survey of how linear attacks can be applied on stream ciphers. It gives an overview of the development of linear attacks and a short theoretical explanation on how a linear attack on a stream cipher is typically launched today. The main part of the paper is then a more detailed description of the application of linear attacks on three ...
Martin Hell, Thomas Johansson
openaire +2 more sources
Fast correlation attacks on certain stream ciphers
Journal of Cryptology, 1989zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Willi Meier, Othmar Staffelbach
openaire +3 more sources
Cryptanalysis of a Chaotic Stream Cipher and Its Improved Scheme
International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, 2018In this paper, the security performance for an 8D self-synchronous and feedback-based chaotic stream cipher with the low 8 bits of state variables for encryption is analyzed.
Zhuosheng Lin +3 more
semanticscholar +1 more source
Algebraic Attacks on Stream Ciphers with Gröbner Bases
2009Stream ciphers efficiently encrypt data streams of arbitrary length and are widely deployed in practice, e.g., in mobile phones. Consequently, the development of new mechanisms to design and analyze stream ciphers is one of the major topics in modern cryptography.
Armknecht, Frederik, Ars, Gwénolé
openaire +3 more sources

