نتایج جستجو برای: stream ciphers

تعداد نتایج: 59892  

2011
Cunsheng Ding Wenpei Si

Although a number of block ciphers have been designed and are available in the public domain, they are usually used in one of the four modes: the cipher block chaining mode, the cipher feedback mode, the output feedback mode, and the counter mode. In all these cases, a stream cipher is actually used, as any block cipher used in any of these modes becomes a stream cipher. Stream ciphers are pref...

Journal: :IACR Cryptology ePrint Archive 2007
Souradyuti Paul

In modern cryptography, stream ciphers are most useful in applications where information needs to be encrypted/decrypted at high speed (e.g. high resolution streaming video data) or when low footprint (gates/memory) encryption is required. In the literature, there exist plenty of stream ciphers whose internal states are based on arrays and that they use modular additions to generate output stre...

2013
Li Wang Yanyan Pei Biao Lian Weili Wu Xueqi Cheng Wenming Ma Yujie Zhang Mehran Abolhasan Xiaoyan Shen Chenjiang Xie Haoxue Liu Zhaowen Qiu Dianfu Ma Yang Yang Biaobiao Shi Bo Jiang Jing Li Shupeng Zhao Miao Tian Shifang Zhang Xiaoxia Niu Yanxia Wu Bowei Zhang Guochang Gu Guoyin Zhang Zhengyi Tang

Recently proposed algebraic attack has been shown to be very effective on several stream ciphers. In this paper, we have investigated the resistance of PingPong family of stream ciphers against algebraic attacks. This stream cipher was proposed in 2008 to enhance the security of the improved summation generator. In particular, we focus on the PingPong-128 stream cipher’s resistance against alge...

2004
Sandeep Kumar Kerstin Lemke Christof Paar Horst Görtz

This contribution describes general considerations for evaluating the quality of a cryptographic implementation, with a strong focus on hardware implementation of stream ciphers. In particular, the features area efficiency, power, and secure implementation are discussed. Even though the main target of the treatment here are stream ciphers, some of the thoughts presented are directly applicable ...

2009
Matt Henricksen

The main objective of this thesis is to examine the trade-offs between security and efficiency within symmetric ciphers. This includes the influence that block ciphers have on the new generation of word-based stream ciphers. By incorporating block-cipher like components into their designs, word-based stream ciphers have experienced hundreds-fold improvement in speed over bit-based stream cipher...

Journal: :IACR Cryptology ePrint Archive 2012
Md. Iftekhar Salam Hoon-Jae Lee

Recently proposed algebraic attack has been shown to be very effective on several stream ciphers. In this paper, we have investigated the resistance of PingPong family of stream ciphers against algebraic attacks. This stream cipher was proposed in 2008 to enhance the security of the improved summation generator against the algebraic attack. In particular, we focus on the PingPong-128 stream cip...

2007
Yassir Nawaz

Block and stream ciphers are widely used to protect the privacy of digital informa-tion. A variety of attacks against block and stream ciphers exist; the most recentbeing the algebraic attacks. These attacks reduce the cipher to a simple algebraicsystem which can be solved by known algebraic techniques. These attacks havebeen very successful against a variety of stream ciphers a...

2007
Pat Morin Eli Biham

The paper \Two Practical and Provably Secure Block Ciphers: BEAR and LION" AnBi96] by Ross Anderson and Eli Biham is summarized. The paper presents two new block ciphers (BEAR and LION) which can be built using a hash function and a stream cipher. Both these ciphers are provably secure in that a successful attack on them can be used as an attack on the underlying hash function and stream cipher...

Journal: :IACR Cryptology ePrint Archive 2017
Vahid Amin Ghafari Honggang Hu Mohammadsadegh alizadeh

After the introduction of some stream ciphers with the minimal internal state, the design idea of these ciphers (i.e. the design of stream ciphers by using a secret key, not only in the initialization but also permanently in the keystream generation) has been developed. The idea lets to design lighter stream ciphers that they are suitable for devices with limited resources such as RFID, WSN. We...

Journal: :IACR Cryptology ePrint Archive 2011
Xiao Ma

This paper shows that a turbo-coded communication system can be made secure with a little bit of complexity cost. The classical permutation ciphers are revisited and analyzed. Firstly, the ideal stream permutation ciphers are shown to be asymptotically information-theoretically secure in the sense that the channel from plaintext to ciphertext has a vanished capacity, while the practical stream ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید