Security Weaknesses in a Randomized Stream Cipher
نویسندگان
چکیده
TriStrata appears to have implemented a variation of Maurer’s randomised cipher. We define a variation of Maurer’s cipher that appears to be similar to the TriStrata version, and show several cryptanalytical attacks against our variant.
منابع مشابه
Security Weaknesses in Maurer-Like Randomized Stream Ciphers
TriStrata appears to have implemented a variation of Maurer’s randomised cipher. We define a variation of Maurer’s cipher that appears to be similar to the TriStrata version, and show several cryptanalytical attacks against our variant.
متن کاملBiometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm
Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...
متن کاملRC4 stream cipher and possible attacks on WEP
In this paper we analyze and present some weaknesses and possible attacks on the RC4 stream cipher which were published in many journals. We review some advantages and disadvantages which come from several authors, as well as similarities and differences which can be observed in the published results. Also, we analyze the Key Scheduling Algorithm (KSA) which derives the initial state from a var...
متن کاملA Survey of Asynchronous Extensions of Block Cipher Modes of Operation
While modes of operation and asynchronously clocked devices have been studied separately, the combination of the two ideas has received little attention. We first consider an asynchronously clocked mode of operation based on an extension of OFB mode [2]. After reviewing some of the weaknesses of our proposed mode of operation, we extend on our original design in an attempt to mask some of the i...
متن کاملA Security Evaluation of Whitenoise
This report studies the security of Whitenoise, a stream cipher invented by BSB Utilities Inc. I present the results of a limited time analysis of this scheme. After a careful security analysis, I was unable to find any security weaknesses in the Whitenoise stream cipher. Whitenoise resists all of the attack methods I was able to think of. This provides evidence for the security of Whitenoise. ...
متن کامل