Results 281 to 290 of about 15,368 (325)
Some of the next articles are maybe not open access.
New correlation attacks on stream ciphers
IEEE AFRICON. 6th Africon Conference in Africa,, 2003We introduce two new correlation attacks on stream ciphers that make use of non-linearly combined linear feedback shift-registers (LFSRs). The first attack utilises the well-known Lempel-Ziv complexity measure for binary sequences. The second attack is based on the binary derivative, applied in conjunction with the distribution of runs in a binary ...
W.T. Penzhorn, C. Bruwer
openaire +1 more source
Distinguishing Attack on SN3 Stream Cipher
2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2008SN3 is a synchronous stream cipher uses keys up to 768-byte. The cipher is constructed as an array base generator in which each key stream word can be considered as a linear combination of some array contents. While the cipher has not been analyzed yet, we show that there is a significance correlation between output key streams and by using this result
Mohammad Ali Orumiehchi +1 more
openaire +1 more source
Fault Attacks on Stream Ciphers
2012In this chapter, we provide an outlook on fault attack techniques aimed at breaking stream ciphers. The chapter will start with an overview of the possible targets for fault attacks among this class of encryption algorithms, and subsequently provide two in-depth case studies on enhancing impossible cryptanalysis against RC4 and differential ...
Alessandro Barenghi, Elena Trichina
openaire +1 more source
Linear Attacks on Stream Ciphers
2011This paper is a survey of how linear attacks can be applied on stream ciphers. It gives an overview of the development of linear attacks and a short theoretical explanation on how a linear attack on a stream cipher is typically launched today. The main part of the paper is then a more detailed description of the application of linear attacks on three ...
Hell Martin, Johansson Thomas
openaire +1 more source
Correlation attacks on stream ciphers
Proceedings of IEEE. AFRICON '96, 2002The fast correlation attack described by Meier and Staffelbach (1989) on certain classes of stream ciphers, based on linear feedback shift registers, requires that the number of taps of the characteristic polynomial must be small-typically less than 10.
openaire +1 more source
Algebraic Attacks on Stream Ciphers with Gröbner Bases
2009Stream ciphers efficiently encrypt data streams of arbitrary length and are widely deployed in practice, e.g., in mobile phones. Consequently, the development of new mechanisms to design and analyze stream ciphers is one of the major topics in modern cryptography.
Armknecht, Frederik, Ars, Gwénolé
openaire +2 more sources
Fault Attacks on Stream Cipher Scream
2015In this paper we present a differential fault attack (DFA) on the stream cipher Scream which is designed by the IBM researchers Coppersmith, Halevi, and Jutla in 2002. The known linear distinguishing attack on Scream takes 2120 output words and there is no key recovery attack on it, since the S-box used by Scream is key-dependent and complex. Under the
Shaoyu Du +3 more
openaire +1 more source

