Results 271 to 280 of about 28,850 (320)
Some of the next articles are maybe not open access.

Fault Attacks on Stream Cipher Scream

2015
In this paper we present a differential fault attack (DFA) on the stream cipher Scream which is designed by the IBM researchers Coppersmith, Halevi, and Jutla in 2002. The known linear distinguishing attack on Scream takes 2120 output words and there is no key recovery attack on it, since the S-box used by Scream is key-dependent and complex. Under the
Bin Zhang   +3 more
openaire   +2 more sources

Parametric Guess and Determine Attack on Stream Ciphers

2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops), 2019
Due to the rapid evolution and usage of IoT devices in the world, the need for lightweight cryptography for resource-constrained devices gained a great importance. Although it has been common in the cryptology community that stream ciphers are supposed to be more efficient in speed and area than block ciphers, it has been seen in the last 10–15 years ...
Orhun Kara, Ebru Kucukkubas
openaire   +1 more source

Chosen ciphertext attack on a chaotic stream cipher

2018 Chinese Control And Decision Conference (CCDC), 2018
This paper studies the security of a recently-proposed 3D chaotic self-synchronization stream cipher. Ac­cording to the chosen-ciphertext attack, a single key decipher algorithm is further investigated. First, multiple pairs of plaintext-ciphertext are obtained by choosing the corresponding multiple frames of ciphertext as fixed values.
Jinhu Lii, Simin Yu, Zhuosheng Lin
openaire   +2 more sources

Comments on Cache-Timing Attacks on Stream Ciphers

2010 First ACIS International Symposium on Cryptography, and Network Security, Data Mining and Knowledge Discovery, E-Commerce and Its Applications, and Embedded Systems, 2010
Cache-timing attacks on the Advanced Encryption Standard block cipher provoked a mass reaction against use of s-boxes in cipher design. This reduced diversity in design strategies. We show that s-boxes can be safely used in stream ciphers, provided that consideration is given to minimizing information leakage.
openaire   +2 more sources

Experimental Statistical Attacks on Block and Stream Ciphers

2009
Efficient statistical tests, e.g. recently suggested “Book Stack” test, are successfully applied to detect deviations from randomness in bit sequences generated by stream ciphers such as RC4 and ZK-Crypt, as well as by block cipher RC6 (with reduced number of rounds). In case of RC6 a key recovery attack is also mounted.
A. Lubkin   +5 more
openaire   +2 more sources

Practical Algebraic Attacks on the Hitag2 Stream Cipher

2009
Hitag2 is a stream cipher that is widely used in RFID car locks in the automobile industry. It can be seen as a (much) more secure version of the [in]famous Crypto-1 cipher that is used in MiFare Classic RFID products [14,20,15]. Recently, a specification of Hitag2 was circulated on the Internet [29]. Is this cipher secure w.r.t.
Sean O'Neil   +2 more
openaire   +2 more sources

Algebraic Attacks on Clock-Controlled Stream Ciphers

2006
We present an algebraic attack approach to a family of irregularly clock-controlled bit-based linear feedback shift register systems. In the general set-up, we assume that the output bit of one shift register controls the clocking of other registers in the system and produces a family of equations relating the output bits to the internal state bits. We
Al Hinai, Sultan   +3 more
openaire   +2 more sources

Improved “exhaustive search” attacks on stream ciphers

European Convention on Security and Detection, 1995
Given a certain amount of known keystream from a keystream generator (KG), the most obvious way to determine the state of the generator is to search through all possible states, checking for a match between the resulting and observed keystream. In this paper, we draw attention to two attacks on stream cipher systems which, although their complexity ...
openaire   +2 more sources

Related Key Chosen IV Attack on Stream Cipher Espresso Variant

22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), 2017
Mingxing Wang, D. Lin
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy