Results 21 to 30 of about 28,850 (320)

An Improved Fast Correlation Attack on Stream Ciphers [PDF]

open access: bronze, 2009
At Crypto'2000, Johansson and Jonsson proposed a fast correlation attack on stream ciphers based on the Goldreich-Rubinfeld-Sudan algorithm. In this paper we show that a combination of their approach with techniques for substituting keystream and evaluating parity-checks gives us the most efficient fast correlation attack known so far.
Bin Zhang, Dengguo Feng
openalex   +3 more sources

Two Attacks Against the HBB Stream Cipher [PDF]

open access: bronze, 2005
Hiji-Bij-Bij (HBB) is a new stream cipher proposed by Sarkar at Indocrypt’03. In this algorithm, classical LFSRs are replaced by cellular automata (CA). This idea of using CAs in such constructions was initially proposed by Sarkar at Crypto’02, in order to instantiate its new Filter-Combiner model.
Antoine Joux, Frédéric Muller
openalex   +4 more sources

Efficient Cipher-Only Attack of a Stream Cipher in RDHEI Based on Pixel Smoothness Estimation

open access: goldEasyChair Preprints, 2019
Reversible data hiding in encrypted images (RDHEI) has recently emerged as an effective approach to protect the confidentiality of image content through encryption while assisting in the management of encrypted images by lossless hiding some additional ...
Yuyu Chen   +5 more
openalex   +3 more sources

Cube Attacks on the Stream Cipher Grain-v1

open access: bronzeDEStech Transactions on Computer Science and Engineering, 2017
Yongjuan Wang, Shiyi Zhang, Yang Gao
openalex   +4 more sources

PudgyTurtle Mode Resists Bit-Flipping Attacks

open access: yesCryptography, 2023
Cryptosystems employing a synchronous binary-additive stream cipher are susceptible to a generic attack called ’bit-flipping’, in which the ciphertext is modified to decrypt into a fraudulent message.
David A. August, Anne C. Smith
doaj   +1 more source

A Fault Attack on the Family of Enocoro Stream Ciphers

open access: yesCryptography, 2021
A differential fault attack framework for the Enocoro family of stream ciphers is presented. We only require that the attacker can reset the internal state and inject a random byte-fault, in a random register, during a known time period. For a single fault injection, we develop a differential clocking algorithm that computes a set of linear equations ...
Julian Danner, Martin Kreuzer
openaire   +3 more sources

Cryptanalysis of Draco

open access: yesIACR Transactions on Symmetric Cryptology, 2022
Draco is a lightweight stream cipher designed by Hamann et al. in IACR ToSC 2022. It has a Grain-like structure with two state registers of size 95 and 33 bits. In addition, the cipher uses a 128-bit secret key and a 96-bit IV.
Subhadeep Banik
doaj   +1 more source

Slide attacks on the Sfinks stream cipher [PDF]

open access: yes2012 6th International Conference on Signal Processing and Communication Systems, 2012
Sfinks is a shift register based stream cipher designed for hardware implementation and submitted to the eSTREAM project. In this paper, we analyse the initialisation process of Sfinks. We demonstrate a slid property of the loaded state of the Sfinks cipher, where multiple key-IV pairs may produce phase shifted keystream sequences.
Al Hamdan, Ali   +4 more
openaire   +3 more sources

Using Evolving Algorithms to Cryptanalysis Nonlinear Cryptosystems

open access: yesمجلة بغداد للعلوم, 2020
In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack.
Riyam Noori Jawad, Faez Hassan Ali
doaj   +1 more source

Findings Annihilator(s) via Fault Injection Attack (FIA) on Boolean Function of Grain v0 [PDF]

open access: yesITM Web of Conferences, 2019
In developing stream cipher algorithms, Boolean function is one of vital elements. Attacks on LFSR-based stream cipher is the challenge for the cryptanalyst to get low-degree annihilator(s).
Ariffin Muhammad Rezal Kamel   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy