Synchronizing data stream processing

نویسندگان

  • Muhammad S. F. Qureshi
  • Janusz R. Getta
چکیده

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Submission to ECRYPT call for stream ciphers: the self-synchronizing stream cipher Mosquito

In this document we specify and motivate the hardware-oriented self-synchronizing stream cipher Mosquito and the underlying cipher architecture and provide hardware implementation results. This stream cipher is a close variant of the cipher ΥΓ, described in [2]. ΥΓ in its turn was a corrected version of the cipher KNOT published in [1], removing the weaknesses that have lead to its breaking in ...

متن کامل

Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers

At Indocrypt’2002, Arnault et al. proposed a new class of self-synchronizing stream ciphers combining LFSR and FCSR architectures. It was claimed to be resistant to known attacks. In this paper, we show that such a self-synchronizing stream cipher is extremely vulnerable to chosen ciphertext attack. We can restore the secret keys easily from one chosen ciphertext with little computation. For th...

متن کامل

Non-Linearity and Security of Self Synchronizing Stream Ciphers

Several proposed chaos based ciphers exploit the ergodic property of chaotic orbits. As chaotic systems are unstable and have sensitive dependence on initial conditions, the main difficulty for the receiver is to reproduce the chaotic signal that has been generated by the sender in order to correctly decrypt the message. This is performed by a self synchronizing device. In discrete cryptography...

متن کامل

Self-Synchronizing Stream Ciphers and Dynamical Systems: State of the Art and Open Issues

synchronizing stream ciphers and dynamical systems: state of the art and open issues. HAL is a multidisciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L'archive ouverte pluridisciplina...

متن کامل

New Applications of T-Functions in Block Ciphers and Hash Functions

Abstract. A T-function is a mapping from n-bit words to n-bit words in which for each 0 ≤ i < n, bit i of any output word can depend only on bits 0, 1, . . . , i of any input word. All the boolean operations and most of the numeric operations in modern processors are T-functions, and all their compositions are also T-functions. Our earlier papers on the subject dealt with “crazy” T-functions wh...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007