نتایج جستجو برای: stream cipher

تعداد نتایج: 68611  

2007
Angelo P. E. Rosiello

We consider a simple and secure way to realize a synchronous stream cipher from iterated hash functions. It is similar to the OFB mode where the underlying block cipher algorithm is replaced with the keyed hash function, adopting the secret suffix method[20]. We analyzed the key, the keystream and the necessary properties to assume from the underlying hash function for the stream cipher to be c...

Journal: :Signal Processing 2002
Hoon-Jae Lee Sang-Jae Moon

Due to ongoing improvements in high-speed communications, the speed of data encryption must also increase. Accordingly, this paper proposes an PS-LFSR with an m(¿ 2)-times faster shifting during one clock interval and a parallel stream cipher that is faster by paralleling many similar keystream generators using the PS-LFSRs. Finally, an m-parallel SUM-BSG with 8-parallel for detail is proposed ...

Journal: :ICST Trans. Security Safety 2013
Xinxin Fan Kalikinkar Mandal Guang Gong

Lightweight cryptographic primitives are essential for securing pervasive embedded devices like RFID tags, smart cards, and wireless sensor nodes. In this paper, we present a lightweight stream cipher WG-8, which is tailored from the well-known Welch-Gong (WG) stream cipher family, for resource-constrained devices. WG-8 inherits the good randomness and cryptographic properties of the WG stream ...

2006
Alexander Kholosha

Pomaranch is a synchronous, hardware-oriented stream cipher submitted to eSTREAM, the ECRYPT Stream Cipher Project. The cipher is designed as a cascade clock-controlled key-stream generator built on jump registers. This paper presents a discussion over the attacks on Pomaranch discovered so far. Particular focus is made on a new inherent property of jump registers that allows to construct their...

2007
Milan Vojvoda Marek Sýs

Stream cipher Edon80 [6] is one of the submissions to the ECRYPT Stream Cipher Project eSTREAM that passed to the Phase II of this project. The core of this cipher is based on pipelined quasigroup transformations using the so called e-transformers [6]. We study algebraic properties of the suggested quasigroups for use in the stream cipher Edon80 and prove that all the suggested quasigroups for ...

2006
Steve Babbage Carlos Cid Norbert Pramstaller

Hermes8 [4,5] is one of the stream ciphers submitted to the ECRYPT Stream Cipher Project (eSTREAM [2]). In this paper we present an attack on the latest version of the cipher (Hermes8F), which requires very few known keystream bytes and recovers the cipher secret key in less than a second on a normal PC.

Journal: :Designs, Codes and Cryptography 2008

2017
Miguel Garcia-Bosque Adrián Pérez Carlos Sánchez-Azqueta Santiago Celma

In this work, we used a sensor-based True Random Number Generator in order to generate keys for a stream cipher based on a recently published hybrid algorithm mixing Skew Tent Map and a Linear Feedback Shift Register. The stream cipher was implemented and tested in a Field Programmable Gate Array (FPGA) and was able to generate 8-bit width data streams at a clock frequency of 134 MHz, which is ...

2001
Paul Crowley Stefan Lucks

We show two methods of distinguishing the LEVIATHAN stream cipher from a random stream using 2 bytes of output and proportional effort; both arise from compression within the cipher. The first models the cipher as two random functions in sequence, and shows that the probability of a collision in 64-bit output blocks is doubled as a result; the second shows artifacts where the same inputs are pr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید