NON LINEAR FEEDBACK STREAM CIPHER
نویسندگان
چکیده
منابع مشابه
Linear Cryptanalysis of Bluetooth Stream Cipher
A general linear iterative cryptanalysis method for solving binary systems of approximate linear equations which is also applicable to keystream generators producing short keystream sequences is proposed. A linear cryptanalysis method for reconstructing the secret key in a general type of initialization schemes is also developed. A large class of linear correlations in the Bluetooth combiner, u...
متن کاملNon-uniformities in the RC4 Stream Cipher
The RC4 stream cipher is used to protect messages from eavesdroppers in many settings, including some of the Transport Layer Security (TLS) protocols used to secure much internet traffic. Nonuniformities in the output of a stream cipher are a weakness that an eavesdropper can exploit to gain information about the encrypted messages. In this report we verify the size of some nonuniformities of R...
متن کاملSOBER: A Stream Cipher based on Linear Feedback over GF(2 g )
case 0: /* just waste a cycle and loop */ break; case 1: /* use the first output from two cycles */ *buf++ ^= nltap(R, r) ^ 0x69; r = cycle(R, r); break; case 2: /* use the second output from two cycles */ r = cycle(R, r); *buf++ ^= nltap(R, r); break; case 3: /* return from one cycle */ *buf++ ^= nltap(R, r) ^ 0x96; break; } } } /* encrypt/decrypt a frame of data */ void sober_genbytes(unsigne...
متن کاملA Stream Cipher Based on Chaotic Permutations
In this paper we introduce a word-based stream cipher consisting of a chaotic part operating as a chaotic permutation and a linear part, both of which designed on a finite field. We will show that this system can operate in both synchronized and self-synchronized modes. More specifically, we show that in the self-synchronized mode the stream cipher has a receiver operating as an unknown input o...
متن کاملLinear Sequential Circuit Approximation of Acterbahn Stream Cipher
Achterbahn stream cipher is proposed as a candidate for ECRYPT eSTREAM project which deals with key of length 80-bit. The linear distinguishing attack,which aims at distinguishing the keystream from purely random keystream,is employed to Achterbahn stream cipher. A linear distinguishing attack is based on linear sequential circuit approximation technique which distinguishes statistical bias in ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer and Communication Technology
سال: 2012
ISSN: 2231-0371,0975-7449
DOI: 10.47893/ijcct.2012.1128