نتایج جستجو برای: stream cipher
تعداد نتایج: 68611 فیلتر نتایج به سال:
We consider a simple and secure way to realize a synchronous stream cipher from iterated hash functions. It is similar to the OFB mode where the underlying block cipher algorithm is replaced with the keyed hash function, adopting the secret suffix method[20]. We analyzed the key, the keystream and the necessary properties to assume from the underlying hash function for the stream cipher to be c...
Due to ongoing improvements in high-speed communications, the speed of data encryption must also increase. Accordingly, this paper proposes an PS-LFSR with an m(¿ 2)-times faster shifting during one clock interval and a parallel stream cipher that is faster by paralleling many similar keystream generators using the PS-LFSRs. Finally, an m-parallel SUM-BSG with 8-parallel for detail is proposed ...
Lightweight cryptographic primitives are essential for securing pervasive embedded devices like RFID tags, smart cards, and wireless sensor nodes. In this paper, we present a lightweight stream cipher WG-8, which is tailored from the well-known Welch-Gong (WG) stream cipher family, for resource-constrained devices. WG-8 inherits the good randomness and cryptographic properties of the WG stream ...
Pomaranch is a synchronous, hardware-oriented stream cipher submitted to eSTREAM, the ECRYPT Stream Cipher Project. The cipher is designed as a cascade clock-controlled key-stream generator built on jump registers. This paper presents a discussion over the attacks on Pomaranch discovered so far. Particular focus is made on a new inherent property of jump registers that allows to construct their...
Stream cipher Edon80 [6] is one of the submissions to the ECRYPT Stream Cipher Project eSTREAM that passed to the Phase II of this project. The core of this cipher is based on pipelined quasigroup transformations using the so called e-transformers [6]. We study algebraic properties of the suggested quasigroups for use in the stream cipher Edon80 and prove that all the suggested quasigroups for ...
Hermes8 [4,5] is one of the stream ciphers submitted to the ECRYPT Stream Cipher Project (eSTREAM [2]). In this paper we present an attack on the latest version of the cipher (Hermes8F), which requires very few known keystream bytes and recovers the cipher secret key in less than a second on a normal PC.
In this work, we used a sensor-based True Random Number Generator in order to generate keys for a stream cipher based on a recently published hybrid algorithm mixing Skew Tent Map and a Linear Feedback Shift Register. The stream cipher was implemented and tested in a Field Programmable Gate Array (FPGA) and was able to generate 8-bit width data streams at a clock frequency of 134 MHz, which is ...
We show two methods of distinguishing the LEVIATHAN stream cipher from a random stream using 2 bytes of output and proportional effort; both arise from compression within the cipher. The first models the cipher as two random functions in sequence, and shows that the probability of a collision in 64-bit output blocks is doubled as a result; the second shows artifacts where the same inputs are pr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید