نتایج جستجو برای: estream
تعداد نتایج: 184 فیلتر نتایج به سال:
Edon80 is a recent stream cipher design that has advanced to the third and last phase of the eSTREAM project. It has remained unbroken and untweaked since it was designed and submitted to eSTREAM. It is now one of the 8 nal hardware candidates. In this paper we cryptanalyze the cipher by describing a key recovery attack. The complexity of the attack is around 2 simple operations for a keystream...
In [6], Biryukov presented a new methodology of stream cipher design, called leak extraction. The stream cipher LEX, based on this methodology and on the AES block cipher, was selected to phase 3 of the eSTREAM competition. The suggested methodology seemed promising, and LEX, due to its elegance, simplicity and performance was expected to be selected to the eSTREAM portfolio. In this paper we s...
The eStream cipher proposal Trivium outputs an XOR sum of six internal state bits. These in turn are obtained from 18 bits linearly, plus six ANDings of two bits each. We show that 4 of the 18 linear terms cancel between themselves.
The eStream project has given us a number of insights into design criteria for stream ciphers. Some of them were disputed, on others everyone seemed to agree. In this paper, the author describes what he has learned and what he considers as possible consequences for stream cipher design. The paper does not contain any groundbreaking new results; it is merely meant as a collection of ideas and an...
In this paper, we will give one update for our submitted primitive DICING for eSTREAM, where we have simplified the initialization and made some small changes in the equations (2.3) and (2.16) to enhance the security and the efficiency.
In this paper, we will give one update for our submitted primitive DICING for eSTREAM, where we have simplified the initialization and made some small changes in the equations (2.3) and (2.16) to enhance the security and the efficiency.
We analyze the relevant candidates in phase 3 of the eSTREAM project with respect to side channel analysis in a theoretical approach.
Salsa20 is a family of 256-bit stream ciphers designed in 2005 and submitted to eSTREAM, the ECRYPT Stream Cipher Project. Salsa20 has progressed to the third round of eSTREAM without any changes. The 20-round stream cipher Salsa20/20 is consistently faster than AES and is recommended by the designer for typical cryptographic applications. The reduced-round ciphers Salsa20/12 and Salsa20/8 are ...
The ZK-Crypt combination compact hardware stream cipher engines each include a true random number generator, a stream cipher and a data authenticator based on a fast compact engine and proven "noise sources". The ZK-Crypt II 7.0 K gate and ZK-Crypt 8.2 K gate "engines" output a 32 bit word at each clock cycle with 128 and 160-bit keys, maximizing throughput with very low energy per enciphered b...
Five leading Phase 2 Profile 2 eSTREAM candidates have been implemented in hardware, targeting two main semiconductor technologies, Field Programmable Gate Arrays (FPGAs) and Application Specific Integrated Circuits (ASICs). An old GSM encryption algorithm A5/1 has been included in the study as well. All six ciphers have been analyzed from the point of view of the hardware efficiency, and two h...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید