Weaknesses in HENKOS Stream Cipher

نویسندگان

  • Prasanth Kumar Thandra
  • S. A. V. Satya Murty
  • R. Balasubramanian
چکیده

Synchronous stream cipher HENKOS is proposed by Marius Oliver Gheorghit to eprint for analyzing the algorithm by cryptologic community. At the first look of HENKOS, it can be observed that a 256 byte secret key is an undesirable quality of the algorithm. Also, the algorithm is not efficient in case of streaming data that has to encrypt instantaneously, this is because the algorithm generates a 256 bytes of key stream in each round.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

HENKOS Stream Cipher

The purpose of this paper is to recommend to cryptographic community and information security specialists, for analysis and testing, a new cryptosystem based on a synchronous stream cipher and a keystream generator. The paper describes the main parts of the cryptosystem, its implementation and analysis of the statistical tests results for the keystream generator. Through its design and concepti...

متن کامل

Nofish - A new stream cipher

The purpose of this paper is to provide a description of the Nofish cryptographic algorithm. This paper is intended to release the algorithm to the cryptographic community, for its future analysis and possible use. The name of the algorithm comes in respect to other well-known secure crypto algorithms like Blowfish and Twofish and since this one has not gained this status, I call it Nofish. 1. ...

متن کامل

RC4 stream cipher and possible attacks on WEP

In this paper we analyze and present some weaknesses and possible attacks on the RC4 stream cipher which were published in many journals. We review some advantages and disadvantages which come from several authors, as well as similarities and differences which can be observed in the published results. Also, we analyze the Key Scheduling Algorithm (KSA) which derives the initial state from a var...

متن کامل

Analysis of SSC2

This paper analyses the stream cipher SSC2 [ZCC00]. We describe some weaknesses and attacks exploiting these weaknesses. The strongest attack needs about 2 words of known key stream and has a time complexity of about 2.

متن کامل

Submission to ECRYPT call for stream ciphers: the self-synchronizing stream cipher Mosquito

In this document we specify and motivate the hardware-oriented self-synchronizing stream cipher Mosquito and the underlying cipher architecture and provide hardware implementation results. This stream cipher is a close variant of the cipher ΥΓ, described in [2]. ΥΓ in its turn was a corrected version of the cipher KNOT published in [1], removing the weaknesses that have lead to its breaking in ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2008  شماره 

صفحات  -

تاریخ انتشار 2008