Results 21 to 30 of about 15,368 (325)

Decimation Attack of Stream Ciphers [PDF]

open access: yes, 2000
This paper presents a new attack called Decimation Attack of most stream ciphers. It exploits the property that multiple clocking (or equivalently d-th decimation) of a LFSR can simulate the behavior of many other LFSRs of possible shorter length. It yields then significant improvements of all the previous known correlation and fast correlation attacks.
openaire   +3 more sources

Some Results on Sprout [PDF]

open access: yes, 2015
. Sprout is a lightweight stream cipher proposed by Armknecht and Mikhalev at FSE 2015. It has a Grain-like structure with two State Registers of size 40 bits each, which is exactly half the state size of Grain v1.
A Biryukov   +4 more
core   +2 more sources

MV3: A new word based stream cipher using rapid mixing and revolving buffers [PDF]

open access: yes, 2006
MV3 is a new word based stream cipher for encrypting long streams of data. A direct adaptation of a byte based cipher such as RC4 into a 32- or 64-bit word version will obviously need vast amounts of memory. This scaling issue necessitates a look for new
A. Biryukov   +14 more
core   +3 more sources

A Practical Attack on the MIFARE Classic [PDF]

open access: yes, 2008
The MIFARE Classic is the most widely used contactless smart card in the market. Its design and implementation details are kept secret by its manufacturer.
Gans, Gerhard de Koning   +2 more
core   +3 more sources

On the Security of Y-00 under Fast Correlation and Other Attacks on the Key [PDF]

open access: yes, 2006
The potential weakness of the Y-00 direct encryption protocol when the encryption box ENC in Y-00 is not chosen properly is demonstrated in a fast correlation attack by S. Donnet et al in Phys. Lett. A 35, 6 (2006) 406-410.
Barbosa   +14 more
core   +3 more sources

A Novel Binary Hybrid PSO-EO Algorithm for Cryptanalysis of Internal State of RC4 Cipher

open access: yesSensors, 2022
Cryptography protects privacy and confidentiality. So, it is necessary to guarantee that the ciphers used are secure and cryptanalysis-resistant. In this paper, a new state recovery attack against the RC4 stream cipher is revealed.
Rizk M. Rizk-Allah   +6 more
doaj   +1 more source

Differential fault location identification by machine learning

open access: yesCAAI Transactions on Intelligence Technology, 2021
As the fault‐based attacks are becoming a more pertinent threat in today's era of edge computing/internet‐of‐things, there is a need to streamline the existing tools for better accuracy and ease of use, so that we can gauge the attacker's power and a ...
Anubhab Baksi   +4 more
doaj   +1 more source

Improved Fast Correlation Attacks on the Sosemanuk Stream Cipher

open access: yesIACR Transactions on Symmetric Cryptology, 2023
In this paper, we present a new algorithm for fast correlation attacks on stream ciphers with improved cryptanalysis results on the Sosemanuk stream cipher, one of the 7 finalists in the eSTREAM project in 2008. The new algorithm exploits the direct sum
Bin Zhang   +3 more
doaj   +1 more source

On the Design of Perceptual MPEG-Video Encryption Algorithms [PDF]

open access: yes, 2006
In this paper, some existing perceptual encryption algorithms of MPEG videos are reviewed and some problems, especially security defects of two recently proposed MPEG-video perceptual encryption schemes, are pointed out.
Bhargava, Bharat   +4 more
core   +6 more sources

Improving OBDD attacks against stream ciphers

open access: yesМатематические вопросы криптографии, 2020
При атаках на поточные шифры диаграммами последовательных бинарных решений (ДПБР) секретное начальное состояние вычисляется с помощью набора из $\mathcal{O}(n)$ ДПБР максимальной ширины $\mathcal{O}(2^{\frac{1-\alpha}{1+\alpha}n})$, где $n$ - длина внутреннего состояния, а $\alpha\in (0,1)$ - степень сжатия шифра.
Hamann, M., Krause, M., Moch, A.
openaire   +3 more sources

Home - About - Disclaimer - Privacy