Cryptanalysis of Some Self-Synchronous Chaotic Stream Ciphers and Their Improved Schemes
نویسندگان
چکیده
In this paper, a cryptanalysis method that combines chosen-ciphertext attack with divide-and-conquer by traversing multiple nonzero component initial conditions (DCA-TMNCIC) is proposed. The used for security analysis of [Formula: see text]-D ([Formula: text]) self-synchronous chaotic stream ciphers employ product two variables and three SCSC-2 SCSC-3), taking 3-D as typical example cryptanalysis. For resisting the combinational effect DCA-TMNCIC, several improved cipher schemes are designed, including SCSC based on nonlinear nominal system (3-D SCSC-NNS) sinusoidal modulation SCSC-SM text])). Theoretical validates schemes.
منابع مشابه
Some Words on Cryptanalysis of Stream Ciphers
I the world of cryptography, stream ciphers are known as primitives used to ensure privacy over a communication channel. One common way to build a stream cipher is to use a keystream generator to produce a pseudorandom sequence of symbols. In such algorithms, the ciphertext is the sum of the keystream and the plaintext, resembling the one-time pad principal. Although the idea behind stream ciph...
متن کاملDeterministic Cryptanalysis of some Stream Ciphers
A new graph-based approach to edit distance cryptanalysis of some clock-controlled generators is here presented in order to simplify search trees of the original attacks. In particular, the proposed improvement is based on cut sets defined on some graphs so that only the most promising branches of the search tree have to be analyzed because certain shortest paths provide the edit distances. The...
متن کاملCryptanalysis of Selected Stream Ciphers
T he aim of this dissertation is to show some cryptanalytical results on a selection of stream ciphers. We have grouped theory and results into three main parts. The first part focuses on the FCSR-based constructions X-FCSR and F-FCSRH v3. For the X-FCSR family of stream ciphers we perform a severe state recovery attack. This attack works for both X-FCSR-128 and X-FCSR-256. We then develop a ge...
متن کاملDifferential Cryptanalysis in Stream Ciphers
In this paper we present a general framework for the application of the ideas of differential cryptanalysis to stream ciphers. We demonstrate that some differences in the key (or the initial state or the plaintext) are likely to cause predicted differences in the key stream or in the internal state. These stream differences can then be used to analyze the internal state of the cipher and retrie...
متن کاملNew Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers
In cryptology we commonly face the problem of finding an unknown key K from the output of an easily computable keyed function F (C,K) where the attacker has the power to choose the public variable C. In this work we focus on self-synchronizing stream ciphers. First we show how to model these primitives in the above-mentioned general problem by relating appropriate functions F to the underlying ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Bifurcation and Chaos
سال: 2021
ISSN: ['0218-1274', '1793-6551']
DOI: https://doi.org/10.1142/s021812742150142x