Weaknesses in HENKOS Stream Cipher
نویسندگان
چکیده
Synchronous stream cipher HENKOS is proposed by Marius Oliver Gheorghit to eprint for analyzing the algorithm by cryptologic community. At the first look of HENKOS, it can be observed that a 256 byte secret key is an undesirable quality of the algorithm. Also, the algorithm is not efficient in case of streaming data that has to encrypt instantaneously, this is because the algorithm generates a 256 bytes of key stream in each round.
منابع مشابه
HENKOS Stream Cipher
The purpose of this paper is to recommend to cryptographic community and information security specialists, for analysis and testing, a new cryptosystem based on a synchronous stream cipher and a keystream generator. The paper describes the main parts of the cryptosystem, its implementation and analysis of the statistical tests results for the keystream generator. Through its design and concepti...
متن کاملNofish - A new stream cipher
The purpose of this paper is to provide a description of the Nofish cryptographic algorithm. This paper is intended to release the algorithm to the cryptographic community, for its future analysis and possible use. The name of the algorithm comes in respect to other well-known secure crypto algorithms like Blowfish and Twofish and since this one has not gained this status, I call it Nofish. 1. ...
متن کاملRC4 stream cipher and possible attacks on WEP
In this paper we analyze and present some weaknesses and possible attacks on the RC4 stream cipher which were published in many journals. We review some advantages and disadvantages which come from several authors, as well as similarities and differences which can be observed in the published results. Also, we analyze the Key Scheduling Algorithm (KSA) which derives the initial state from a var...
متن کاملAnalysis of SSC2
This paper analyses the stream cipher SSC2 [ZCC00]. We describe some weaknesses and attacks exploiting these weaknesses. The strongest attack needs about 2 words of known key stream and has a time complexity of about 2.
متن کاملSubmission to ECRYPT call for stream ciphers: the self-synchronizing stream cipher Mosquito
In this document we specify and motivate the hardware-oriented self-synchronizing stream cipher Mosquito and the underlying cipher architecture and provide hardware implementation results. This stream cipher is a close variant of the cipher ΥΓ, described in [2]. ΥΓ in its turn was a corrected version of the cipher KNOT published in [1], removing the weaknesses that have lead to its breaking in ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2008 شماره
صفحات -
تاریخ انتشار 2008