نتایج جستجو برای: رمز رشته ای rc4
تعداد نتایج: 247422 فیلتر نتایج به سال:
We have established two human cell lines which elaborate colony-stimulating activity (CSA) for at least four species: man, mouse, rabbit, and dog. One, GCT, was isolated from a lung metastasis of a fibrous histiocytoma; the other, RC4, from a monocyte-enriched fraction of normal blood. Medium conditioned by either GCT or RC4 cells was more potent in stimulating human marrow growth in vitro than...
Data security in u-Health system can be an important issue because wireless network is vulnerable to hacking. However, it is not easy to implement a proper security algorithm in an embedded u-health monitoring because of hardware constraints such as low performance, power consumption and limited memory size and etc. To secure data that contain personal and biosignal information, we implemented ...
In SAC 2010, Sepehrdad, Vaudenay and Vuagnoux have reported some empirical biases between the secret key, the internal state variables and the keystream bytes of RC4, by searching over a space of all linear correlations between the quantities involved. In this paper, for the first time, we give theoretical proofs for all such significant empirical biases. Our analysis not only builds a framewor...
Wired equivalent privacy encryption of IEEE 802.11 standard is based on the RC4 stream cipher, but the weakness in its Initialization Vector (IV) derivation causes the Key Scheduling Algorithm (KSA) of RC4 to leak out the information about the secret key. It is shared among the particular participants in the Wireless LAN (WLAN). Housley et al. proposed an Alternate Temporal Key Hash (ATKH) to s...
Information security plays one of the very important roles in the field of emergent information and communication technology. The applications such as medical images and satellite images needs the security only in the required portion, which contains the useful information .To improve the perception of surroundings and to monitor the earth’s surface, remote sensing is used and it led the way fo...
In this paper, the hardware implementations of four representative stream ciphers are compared in terms of performance and consumed area. The ciphers used for this comparison are the A5/1, E0, RC4 and Helix. The first three ones have been used for the security part of well-known standards, especially in wireless ones, while the Helix cipher is a recently introduced fast, word oriented, stream c...
We present an efficient algorithm that can distinguish the keystream of WPA from that of a generic instance of RC4 with a packet complexity of O(N), where N denotes the size of the internal permutation of RC4. In practice, our distinguisher requires approximately 2 packets; thus making it the best known distinguisher of WPA to date. This is a significantly improved distinguisher than the previo...
RC4 remains one of the most widely used stream cipher. In order to face the main critical weaknesses, a number of proposals for modifying RC4 algorithm have been advanced. In this paper we analyze some combinatorial aspects regarding the randomness of a variant of the KeyScheduling Algorithm (KSA), called KSAm, proposed by Crainicu and Boian in [2] as a better protection against Initialization ...
As sensor networks edge closer toward wide-spread deployment, security issues become a central concern. So far, the main research focus has been on making sensor networks feasible and useful, and less emphasis was placed on security. In this paper we present a new light weight secure protocol based on RC4 stream cipher. In addition, we construct an RC4 based one-way hash function, which can be ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید