Improving security of Vector Stream Cipher
نویسندگان
چکیده
منابع مشابه
Further improving security of Vector Stream Cipher
Vector Stream Cipher (VSC) is a stream cipher which consists of permutation polynomial over a ring of modulo 2w . The algorithm for generating stream keys is very simple and the encryption speed is very fast. Some theoretical attacks for VSC have been reported so far since the invention of VSC in 2004. Then, the authors proposed some improvements and developed “Vector Stream Cipher 2.0 (VSC 2.0...
متن کاملSecurity Evaluation of Rakaposhi Stream Cipher
Rakaposhi is a synchronous stream cipher, which uses three main components a non-linear feedback shift register (NLFSR), a dynamic linear feedback shift register (DLFSR) and a non-linear filtering function (NLF ). NLFSR consists of 128 bits and is initialised by the secret key K. DLFSR holds 192 bits and is initialised by an initial vector (IV ). NLF takes 8-bit inputs and returns a single outp...
متن کاملOn the Security of Stream Cipher CryptMT
CryptMT v3 is a stream cipher submitted to eStream project, and has entered the third evaluation phase. Any attack has not been found until now. In this paper, we mainly discuss the security of the state initialization process of CryptMT v3. For the key and IV setup function fK , we can construct a probabilistic testing algorithm A fK with a distinguishing probability 1, which indicates that fo...
متن کاملSecurity Evaluation of Stream Cipher Enocoro-128v2
This report presents a security evaluation of the Enocoro128v2 stream cipher. Enocoro-128v2 was proposed in 2010 and is a member of the Enocoro family of stream ciphers. This evaluation examines several different attacks applied to the Enocoro-128v2 design. No attack better than exhaustive key search has been found.
متن کاملVector Stream Cipher Instant Key Recovery
Vector Stream Cipher (VSC) is a stream cipher designed by ChaosWare and patented by NICT (formerly CRL), Japanese patents 3030341 and 3455758, US patent 6,668,265. VSC is recommended by the Softbank Technology Corporation for use in high bandwidth and high security applications. In this paper we present a practical attack instantly recovering the entire secret key of the high-speed single-round...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nonlinear Theory and Its Applications, IEICE
سال: 2016
ISSN: 2185-4106
DOI: 10.1587/nolta.7.30