نتایج جستجو برای: estream

تعداد نتایج: 184  

2005
Shahram Khazaei Mehdi Hassanzadeh

Abstract TRIVIUM is the simplest ECRYPT Stream Cipher project Candidate which deals with key and IV of length 80. Using the sequential Circuit Approximation method, introduced by Golic in 94, we derive a linear function of consecutive keystream bits which is hold with correlation coefficient of about 2. This shows that TRIVIUM is strong against linear sequential circuit approximation attack in ...

Journal: :Des. Codes Cryptography 2012
Paul Stankovski Sushmita Ruj Martin Hell Thomas Johansson

HC-128 is an eSTREAM final portfolio stream cipher. Several authors have investigated its security and, in particular, distinguishing attacks have been considered. Still, no one has been able to provide a distinguisher stronger than the one presented by Wu in the original HC128 paper. In this paper we first argue that the keystream requirement in Wu’s original attack is underestimated by a fact...

2007
Patrick Schaumont Ingrid Verbauwhede

The ESTREAM project has identified two profiles for stream ciphers: a hardware profile and a software profile. The software profile is directly applicable to many computer systems. The hardware profile, on the other hand, does not reflect a complete system design, but instead represents a stand-alone component. In this paper we consider the integration of hardware stream ciphers in software sys...

2006
Sultan Al-Hinai Lynn Margaret Batten Bernard D. Colbert Kenneth Koon-Ho Wong

Stream ciphers are encryption algorithms used for ensuring the privacy of digital telecommunications. They have been widely used for encrypting military communications, satellite communications, pay TV encryption and for voice encryption of both fixed lined and wireless networks. The current multi year European project eSTREAM, which aims to select stream ciphers suitable for widespread adoptat...

2008
Pascal Delaunay Antoine Joux

We present a new side-channel attack against VEST, a set of four stream ciphers which reached the second phase of the eSTREAM project (the European stream cipher project). The proposed attacks target the counter part of the ciphers, composed of 16 short-length nonlinear feedback shift registers (NLFSR) independently updated. Our aim is to retrieve the whole initial state of the counter (163 to ...

2006
Côme Berbain Henri Gilbert Alexander Maximov

Grain [11] is a lightweight stream cipher proposed by M. Hell, T. Johansson, and W. Meier to the eSTREAM call for stream cipher proposals of the European project ECRYPT [5]. Its 160-bit internal state is divided into a LFSR and an NFSR of length 80 bits each. A filtering boolean function is used to derive each keystream bit from the internal state. By combining linear approximations of the feed...

2005
Shahram Khazaei

Pomaranch is a synchronous stream cipher submitted to eSTREAM, the ECRYPT Stream Cipher Project. It uses 128-bit keys and IVs with different lengths. The cipher is constructed as a cascade clock control sequence generator, which is based on the notion of jump registers. Each jump register can be considered as a non-autonomous finite state machine which the input sequence is called jump control ...

Journal: :IACR Cryptology ePrint Archive 2016
Vahid Aminghafari Honggang Hu

In eSTREAM project, a few lightweight stream cipher for hardware was introduced (2008) and then in FSE 2015 Sprout was proposed. Sprout introduced a new idea, design of stream cipher with shorter internal state by using key not only in initialization but also in keystream generation, but it was insecure. Grain-v1 is almost the lightest secure cipher in world. Fruit stream cipher is successor of...

2010
Simon Knellwolf Willi Meier María Naya-Plasencia

Non-linear feedback shift registers are widely used in lightweight cryptographic primitives. For such constructions we propose a general analysis technique based on differential cryptanalysis. The essential idea is to identify conditions on the internal state to obtain a deterministic differential characteristic for a large number of rounds. Depending on whether these conditions involve public ...

2010
Aleksandar Kircanski Amr M. Youssef

HC-128 is a high speed stream cipher with a 128-bit secret key and a 128-bit initialization vector. It has passed all the three stages of the ECRYPT stream cipher project and is a member of the eSTREAM software portfolio. In this paper, we present a differential fault analysis attack on HC-128. The fault model in which we analyze the cipher is the one in which the attacker is able to fault a ra...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید