Results 31 to 40 of about 28,850 (320)
Grain-128AEAD is a lightweight authenticated encryption stream cipher and one of the finalists in the National Institute of Standards and Technology (NIST) Lightweight Cryptography (LWC) project. This paper provides an independent third-party analysis of
Iftekhar Salam +5 more
semanticscholar +1 more source
An Improved Guess-and-Determine Attack on the A5/1 Stream Cipher
In Europe and North America, the most widely used stream cipher to ensure privacy and confidentiality of conversations in GSM mobile phones is the A5/1.
Ayan Mahalanobis, Jay Shah
openalex +3 more sources
Side Channel Attack On Stream Ciphers: A Three-Step Approach To State/Key Recovery
Side Channel Attack (SCA) exploits the physical information leakage (such as electromagnetic emanation) from a device that performs some cryptographic operation and poses a serious threat in the present IoT era. In the last couple of decades, there have
Satyam Kumar +6 more
doaj +1 more source
Attacks on the RC4 stream cipher [PDF]
In this article we present some weaknesses in the RC4 cipher and their cryptographic applications. Especially we improve the attack described by Fluhrer, Mantin, Shamir (In: Selected Areas in Cryptography, 2001) in such a way, that it will work, if the weak keys described in that paper are avoided.
openaire +2 more sources
Decimation Attack of Stream Ciphers [PDF]
This paper presents a new attack called Decimation Attack of most stream ciphers. It exploits the property that multiple clocking (or equivalently d-th decimation) of a LFSR can simulate the behavior of many other LFSRs of possible shorter length. It yields then significant improvements of all the previous known correlation and fast correlation attacks.
openaire +4 more sources
Random Fault Attacks on a Class of Stream Ciphers [PDF]
In this paper, we show that stream ciphers with a particular form of ciphertext output function are vulnerable to differential fault attacks using random faults. The CAESAR competition candidates Tiaoxin-346 and AEGIS-128L both fall into this category, and we show that our attack can be used to recover the secret key of Tiaoxin-346 and the entire state
Harry Bartlett +5 more
openaire +3 more sources
A Novel Binary Hybrid PSO-EO Algorithm for Cryptanalysis of Internal State of RC4 Cipher
Cryptography protects privacy and confidentiality. So, it is necessary to guarantee that the ciphers used are secure and cryptanalysis-resistant. In this paper, a new state recovery attack against the RC4 stream cipher is revealed.
Rizk M. Rizk-Allah +6 more
doaj +1 more source
Differential fault location identification by machine learning
As the fault‐based attacks are becoming a more pertinent threat in today's era of edge computing/internet‐of‐things, there is a need to streamline the existing tools for better accuracy and ease of use, so that we can gauge the attacker's power and a ...
Anubhab Baksi +4 more
doaj +1 more source
DNA computing based stream cipher for internet of things using MQTT protocol
Internet of Things (IoT) is a rapidly developing technology that enables “devices” to communicate and share information amongst them without human control. The devices have the features of internet connectivity and networking.
Noor Hussein, Mohamed Ibrahim Shujaa
semanticscholar +1 more source
A New Method for Format Preserving Encryption in High-Data Rate Communications
In some encryption systems it is necessary to preserve the format and length of the encrypted data. This kind of encryption is called FPE (Format Preserving Encryption).
Adrian Perez-Resa +3 more
doaj +1 more source

