نتایج جستجو برای: estream

تعداد نتایج: 184  

2007
Yukiyasu Tsunoo Teruo Saito Hiroyasu Kubo Tomoyasu Suzaki Hiroki Nakashima

This paper presents a cryptanalysis of the Salsa20 stream cipher proposed in 2005. Salsa20 was submitted to eSTREAM, the ECRYPT Stream Cipher Project. The cipher uses bitwise XOR, addition modulo 2, and constant-distance rotation operations on an internal state of 16 32-bit words. It is reported that there is a significant bias in the differential probability for Salsa20’s 4 round internal stat...

2009
Deian Stefan

Rabbit is a software-oriented synchronous stream cipher with very strong security properties and support for 128-bit keys. Rabbit is part of the European Union’s eSTREAM portfolio of stream ciphers addressing the need for strong and computationally efficient (i.e., fast) ciphers. Extensive cryptanalysis confirms Rabbit’s strength against modern attacks; attacks with complexity lower than an exh...

Journal: :IACR Cryptology ePrint Archive 2007
Cameron McDonald Chris Charnes Josef Pieprzyk

Trivium is a stream cipher candidate of the eStream project. It has successfully moved into phase three of the selection process under the hardware category. No attacks faster than the exhaustive search have so far been reported on Trivium. Bivium-A and Bivium-B are simplified versions of Trivium that are built on the same design principles but with two registers. The simplified design is usefu...

2005
Gilles Piret

DICING is a synchronous stream cipher submitted to the ECRYPT stream cipher project. Two versions of the cipher actually exist: the first one can be found in the proceedings of the SKEW conference, while the second is available from the web site. In this paper we describe practical distinguishing and key recovery attacks against the first version. These attacks do not apply as such to the web s...

Journal: :IACR Cryptology ePrint Archive 2009
Yupu Hu Juntao Gao Qing Liu

Trivium is a hardware-oriented stream cipher, and one of the finally chosen ciphers by eSTREAM project. Michal Hojsik and Bohuslav Rudolf presented an effective attack to Trivium, named floating fault analysis, at INDOCRYPT 2008. Their attack makes use of the fault injection and the fault float. In this paper, we present an improvement of this attack. Our attack is under following weaker and mo...

2007
Antoine Joux Jean-René Reinhard

VEST is a set of four stream cipher families submitted by S. O’Neil, B. Gittins and H. Landman to the eSTREAM call for stream cipher proposals of the European project ECRYPT. The state of any family member is made of three components: a counter, a counter diffusor and a core accumulator. We show that collisions can be found in the counter during the IV Setup. Moreover they can be combined with ...

Journal: :IACR Cryptology ePrint Archive 2007
Alexander Maximov Alex Biryukov

Trivium is a stream cipher designed in 2005 by C. De Cannière and B. Preneel for the European project eSTREAM. It has successfully passed the first phase of the project and has been selected for a special focus in the second phase for the hardware portfolio of the project. Trivium has an internal state of size 288 bits and the key of length 80 bits. Although the design has a simple and elegant ...

2007
Yassir Nawaz

Block and stream ciphers are widely used to protect the privacy of digital informa-tion. A variety of attacks against block and stream ciphers exist; the most recentbeing the algebraic attacks. These attacks reduce the cipher to a simple algebraicsystem which can be solved by known algebraic techniques. These attacks havebeen very successful against a variety of stream ciphers a...

2013
Petr Svenda Martin Ukrop Vashek Matyas

Cryptanalysis of a cryptographic function usually requires advanced cryptanalytical skills and extensive amount of human labor with an option of using randomness testing suites like STS NIST [15] or Dieharder [3]. These can be applied to test statistical properties of cryptographic function outputs. We propose a more open approach based on software circuit that acts as a testing function automa...

2007
Meltem Sönmez Turan Orhun Kara

Trivium, designed by De Cannière and Preneel, is one of the focus ciphers of Phase II for the eSTREAM project. In this paper, we model the initialization part of Trivium as an 8-round function where each round consists of 144 Trivium clocks, and analyze the security margin in terms of number of rounds. This is an open question. Nevertheless, we give some partial answers. As one example, we appl...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید