Results 271 to 280 of about 28,850 (320)
Some of the next articles are maybe not open access.
Fault Attacks on Stream Cipher Scream
2015In this paper we present a differential fault attack (DFA) on the stream cipher Scream which is designed by the IBM researchers Coppersmith, Halevi, and Jutla in 2002. The known linear distinguishing attack on Scream takes 2120 output words and there is no key recovery attack on it, since the S-box used by Scream is key-dependent and complex. Under the
Bin Zhang +3 more
openaire +2 more sources
Parametric Guess and Determine Attack on Stream Ciphers
2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops), 2019Due to the rapid evolution and usage of IoT devices in the world, the need for lightweight cryptography for resource-constrained devices gained a great importance. Although it has been common in the cryptology community that stream ciphers are supposed to be more efficient in speed and area than block ciphers, it has been seen in the last 10–15 years ...
Orhun Kara, Ebru Kucukkubas
openaire +1 more source
Chosen ciphertext attack on a chaotic stream cipher
2018 Chinese Control And Decision Conference (CCDC), 2018This paper studies the security of a recently-proposed 3D chaotic self-synchronization stream cipher. According to the chosen-ciphertext attack, a single key decipher algorithm is further investigated. First, multiple pairs of plaintext-ciphertext are obtained by choosing the corresponding multiple frames of ciphertext as fixed values.
Jinhu Lii, Simin Yu, Zhuosheng Lin
openaire +2 more sources
Comments on Cache-Timing Attacks on Stream Ciphers
2010 First ACIS International Symposium on Cryptography, and Network Security, Data Mining and Knowledge Discovery, E-Commerce and Its Applications, and Embedded Systems, 2010Cache-timing attacks on the Advanced Encryption Standard block cipher provoked a mass reaction against use of s-boxes in cipher design. This reduced diversity in design strategies. We show that s-boxes can be safely used in stream ciphers, provided that consideration is given to minimizing information leakage.
openaire +2 more sources
Experimental Statistical Attacks on Block and Stream Ciphers
2009Efficient statistical tests, e.g. recently suggested “Book Stack” test, are successfully applied to detect deviations from randomness in bit sequences generated by stream ciphers such as RC4 and ZK-Crypt, as well as by block cipher RC6 (with reduced number of rounds). In case of RC6 a key recovery attack is also mounted.
A. Lubkin +5 more
openaire +2 more sources
Practical Algebraic Attacks on the Hitag2 Stream Cipher
2009Hitag2 is a stream cipher that is widely used in RFID car locks in the automobile industry. It can be seen as a (much) more secure version of the [in]famous Crypto-1 cipher that is used in MiFare Classic RFID products [14,20,15]. Recently, a specification of Hitag2 was circulated on the Internet [29]. Is this cipher secure w.r.t.
Sean O'Neil +2 more
openaire +2 more sources
Algebraic Attacks on Clock-Controlled Stream Ciphers
2006We present an algebraic attack approach to a family of irregularly clock-controlled bit-based linear feedback shift register systems. In the general set-up, we assume that the output bit of one shift register controls the clocking of other registers in the system and produces a family of equations relating the output bits to the internal state bits. We
Al Hinai, Sultan +3 more
openaire +2 more sources
Improved “exhaustive search” attacks on stream ciphers
European Convention on Security and Detection, 1995Given a certain amount of known keystream from a keystream generator (KG), the most obvious way to determine the state of the generator is to search through all possible states, checking for a match between the resulting and observed keystream. In this paper, we draw attention to two attacks on stream cipher systems which, although their complexity ...
openaire +2 more sources
FPGA Hardware Co-Simulation of Image Encryption Using Stream Cipher Based on Chaotic Maps
Sensing and Imaging, 2020F. S. Hasan, Maryam Amer Saffo
semanticscholar +1 more source
Related Key Chosen IV Attack on Stream Cipher Espresso Variant
22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), 2017Mingxing Wang, D. Lin
semanticscholar +1 more source

