Cryptanalysis of Stream Cipher Cryptosystem Based on Soft Computing Techniques

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of Stream Cipher DECIM

Stream cipher DECIM is a hardware oriented cipher with 80-bit key and 64-bit IV. In this paper, we point out two serious flaws in DECIM. One flaw is in the initialization of DECIM. It causes about half of the key bits being recovered bit-by-bit when one key is used with about 2 random IVs, and only the first two bytes of each keystream are needed in the attack. The amount of computations requir...

متن کامل

Design of Stream Cipher for Text Encryption using Soft Computing based Techniques

In cryptography, encryption is the process of transforming information referred to as plaintext using an algorithm (called a cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is information which is, referred to as ciphertext. Stream ciphers are used to encrypt individual bits. This is achieved by adding a ...

متن کامل

Cryptanalysis of RAKAPOSHI Stream Cipher

RAKAPOSHI is a hardware oriented stream cipher designed by Carlos Cid et al. in 2009. The stream cipher is based on Dynamic Linear Feedback Shift Registers, with a simple and potentially scalable design, and is particularly suitable for hardware applications with restricted resources. The RAKAPOSHI stream cipher offers 128-bit security. In this paper, we point out some weaknesses in the cipher....

متن کامل

Cryptanalysis of Stream Cipher Alpha1

Komninos, Honary and Darnell recently proposed stream cipher Alpha1. Alpha1 is based on A5/1 and is claimed to be much safer than A5/1. However Alpha1 is insecure: a 29-bit feedback shift register could be recovered with about 3000 known plaintext bits with O(2) operations. The rest of the message could be recovered in the broadcast application in which the same message is encrypted with differ...

متن کامل

A Stream Cipher Based on Chaotic Permutations

In this paper we introduce a word-based stream cipher consisting of a chaotic part operating as a chaotic permutation and a linear part, both of which designed on a finite field. We will show that this system can operate in both synchronized and self-synchronized modes. More specifically, we show that in the self-synchronized mode the stream cipher has a receiver operating as an unknown input o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IOSR Journal of Computer Engineering

سال: 2017

ISSN: 2278-8727,2278-0661

DOI: 10.9790/0661-1901047884