Results 21 to 30 of about 15,368 (325)
Decimation Attack of Stream Ciphers [PDF]
This paper presents a new attack called Decimation Attack of most stream ciphers. It exploits the property that multiple clocking (or equivalently d-th decimation) of a LFSR can simulate the behavior of many other LFSRs of possible shorter length. It yields then significant improvements of all the previous known correlation and fast correlation attacks.
openaire +3 more sources
. Sprout is a lightweight stream cipher proposed by Armknecht and Mikhalev at FSE 2015. It has a Grain-like structure with two State Registers of size 40 bits each, which is exactly half the state size of Grain v1.
A Biryukov +4 more
core +2 more sources
MV3: A new word based stream cipher using rapid mixing and revolving buffers [PDF]
MV3 is a new word based stream cipher for encrypting long streams of data. A direct adaptation of a byte based cipher such as RC4 into a 32- or 64-bit word version will obviously need vast amounts of memory. This scaling issue necessitates a look for new
A. Biryukov +14 more
core +3 more sources
A Practical Attack on the MIFARE Classic [PDF]
The MIFARE Classic is the most widely used contactless smart card in the market. Its design and implementation details are kept secret by its manufacturer.
Gans, Gerhard de Koning +2 more
core +3 more sources
On the Security of Y-00 under Fast Correlation and Other Attacks on the Key [PDF]
The potential weakness of the Y-00 direct encryption protocol when the encryption box ENC in Y-00 is not chosen properly is demonstrated in a fast correlation attack by S. Donnet et al in Phys. Lett. A 35, 6 (2006) 406-410.
Barbosa +14 more
core +3 more sources
A Novel Binary Hybrid PSO-EO Algorithm for Cryptanalysis of Internal State of RC4 Cipher
Cryptography protects privacy and confidentiality. So, it is necessary to guarantee that the ciphers used are secure and cryptanalysis-resistant. In this paper, a new state recovery attack against the RC4 stream cipher is revealed.
Rizk M. Rizk-Allah +6 more
doaj +1 more source
Differential fault location identification by machine learning
As the fault‐based attacks are becoming a more pertinent threat in today's era of edge computing/internet‐of‐things, there is a need to streamline the existing tools for better accuracy and ease of use, so that we can gauge the attacker's power and a ...
Anubhab Baksi +4 more
doaj +1 more source
Improved Fast Correlation Attacks on the Sosemanuk Stream Cipher
In this paper, we present a new algorithm for fast correlation attacks on stream ciphers with improved cryptanalysis results on the Sosemanuk stream cipher, one of the 7 finalists in the eSTREAM project in 2008. The new algorithm exploits the direct sum
Bin Zhang +3 more
doaj +1 more source
On the Design of Perceptual MPEG-Video Encryption Algorithms [PDF]
In this paper, some existing perceptual encryption algorithms of MPEG videos are reviewed and some problems, especially security defects of two recently proposed MPEG-video perceptual encryption schemes, are pointed out.
Bhargava, Bharat +4 more
core +6 more sources
Improving OBDD attacks against stream ciphers
При атаках на поточные шифры диаграммами последовательных бинарных решений (ДПБР) секретное начальное состояние вычисляется с помощью набора из $\mathcal{O}(n)$ ДПБР максимальной ширины $\mathcal{O}(2^{\frac{1-\alpha}{1+\alpha}n})$, где $n$ - длина внутреннего состояния, а $\alpha\in (0,1)$ - степень сжатия шифра.
Hamann, M., Krause, M., Moch, A.
openaire +3 more sources

