نتایج جستجو برای: stream cipher
تعداد نتایج: 68611 فیلتر نتایج به سال:
Cryptosystems employing a synchronous binary-additive stream cipher are susceptible to generic attack called ’bit-flipping’, in which the ciphertext is modified decrypt into fraudulent message. While authenticated encryption and message authentication codes can effectively negate this attack, modes also provide partial protection against bit-flipping. PudgyTurtle stream-cipher mode uses keystre...
DSP-128 is a new multithreaded stream cipher based on the intractability of the Discrete Logarithm Problem (DLP) with key size of 128-bit. The design of DSP-128 is divided into three stages: Initialization Stage, Keystream Generation Stage, and Encryption Stage. The design goal of DSP-128 is to come up with a secure stream cipher with good performance for data encryption. The experimental resul...
In [6], Biryukov presented a new methodology of stream cipher design called leak extraction. The stream cipher LEX, based on this methodology and on the AES block cipher, was selected to phase 3 of the eSTREAM competition. The suggested methodology seemed promising, and LEX, due to its elegance, simplicity, and performance, was expected to be selected to the eSTREAM portfolio. In this paper we ...
It has been common knowledge that for a stream cipher to be secure against generic TMD tradeoff attacks, the size of its internal state in bits needs at least twice length secret key. In FSE 2015, Armknecht and Mikhalev however proposed Sprout with Grain-like architecture, whose was equal key yet resistant attacks. Although had other weaknesses, it germinated sequence designs like Lizard Plantl...
In this paper, we will propose a new synchronous stream cipher named DICING, which can be taken as a clock-controlled one but with a new mechanism of altering steps. With the simple construction, DICING has satisfactory performance, faster than AES about two times. For the security, there have not been found weakness for the known attacks, the key sizes can be 128 bits and 256 bits respectively.
We propose a new stream cipher called “Polar Bear”. It combines constructions used successfully in other situations. The key initialization uses Rijndael, the steady state uses a dynamic table as in RC4 and we guarantee a long period through the use of a linear feedback shiftregister. The efficiency for short messages is better than that of RC4 while for long messages Polar Bear is about a fact...
In [6], Biryukov presented a new methodology of stream cipher design, called leak extraction. The stream cipher LEX, based on this methodology and on the AES block cipher, was selected to phase 3 of the eSTREAM competition. The suggested methodology seemed promising, and LEX, due to its elegance, simplicity and performance was expected to be selected to the eSTREAM portfolio. In this paper we s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید