نتایج جستجو برای: Stream Cipher

تعداد نتایج: 68611  

ژورنال: پژوهش های ریاضی 2015
Daneshgar , A, Khadem , B, Mohebipur , F,

In this paper we introduce a word-based stream cipher consisting of a chaotic part operating as a chaotic permutation and a linear part, both of which designed on a finite field. We will show that this system can operate in both synchronized and self-synchronized modes. More specifically, we show that in the self-synchronized mode the stream cipher has a receiver operating as an unknown input o...

Journal: :IACR transaction on symmetric cryptology 2022

Stream ciphers are vulnerable to generic time-memory-data tradeoff attacks. These attacks reduce the security level half of cipher’s internal state size. The conventional way handle this vulnerability is design cipher with an twice as large desired level. In lightweight cryptography and heavily resource constrained devices, a size big drawback for cipher. This principle can be found in eSTREAM ...

Journal: :IACR Cryptology ePrint Archive 2007
An-Ping Li

In this paper, we will propose a new type of cipher named DICING_csb, which is derived from our previous stream cipher DICING. It has applied a stream of subkey and an encryption form of block ciphers, so it may be viewed as a combinative of stream cipher and block cipher. Hence, the new type of cipher has fast rate like a stream cipher and need no MAC. .

Journal: :International Journal of Computer Applications 2014

Journal: :IACR Cryptology ePrint Archive 2010
Sandy Harris

An earlier paper by the same author suggested combining a block cipher and a stream cipher to get a strong hybrid cipher. This paper proposes a specific cipher based on those ideas, using the HC-128 stream cipher and a tweakable block cipher based on Serpent. Table of

2010
Ruming Yin Jian Yuan Qiuhua Yang Xiuming Shan Xiqin Wang

Linear cryptanalysis methods are rarely used to improve the security of chaotic stream ciphers. In this paper, we apply linear cryptanalysis to a chaotic stream cipher which was designed by strictly using the basic design criterion of cryptosystem – confusion and diffusion. We show that this well-designed chaos-based stream cipher is still insecure against distinguishing attack. This distinguis...

2013
Chuah Chai Wen Ed Dawson Leonie Ruth Simpson

A key derivation function is used to generate one or more cryptographic keys from a private (secret) input value. This paper proposes a new method for constructing a generic stream cipher based key derivation function. We show that our proposed key derivation function based on stream ciphers is secure if the underlying stream cipher is secure. We simulate instances of this stream cipher based k...

2009

Magic square and stream cipher issue are very interest well-tried topic. In this paper, we are proposed a new scheme which stream cipher application for random access file that based on magic square method. By the way, there are two thresholds to secure ours data, if decrypts only by the stream cipher. It isn’t to recovery original source. In other hand, we improve the model of cipher stream to...

2011
Chungath Srinivasan K. V. Lakshmy Madathil Sethumadhavan

In stream cipher cryptography a pseudorandom sequence of bits of length equal to the message length is generated. This sequence is then bitwise XORed (addition modulo 2) with the message sequence and the resulting sequence is transmitted. At the receiving end, deciphering is done by generating the same pseudorandom sequence and bitwise XORing the cipher bits with the random bits. The seed of th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید