نتایج جستجو برای: estream
تعداد نتایج: 184 فیلتر نتایج به سال:
Abstract This survey presents the rich history of Welch-Gong (WG) Stream cipher family. It has been a long journey that lead WG stream ciphers to become practical. The evolutionary path is combination mathematical endeavour and engineering striving transfer pure functions practical encryption algorithms for various applications. began as pioneering work on transformation sequences with 2-level ...
This paper presents hardware implementation and performance metrics for the candidate stream ciphers remaining in the phase-III hardware profile. The results are presented in tabular and graphical format together with summarising the utility of the candidates against two notional applications: one for 10Mbps wireless network and a second for 100kHz RFID. An attempt has been made to quantify the...
d-Monomial tests are statistical randomness tests based on Algebraic Normal Form representation of a Boolean function, and were first introduced by Filiol in 2002. We show that there are strong indications that the Gate Complexity of a Boolean function is related to a bias detectable in a d-Monomial test. We then discuss how to effectively apply d-Monomial tests in chosen-IV attacks against str...
Although Differential Fault Analysis (DFA) led to powerful applications against public key [15] and secret key [12] cryptosystems, very few works have been published in the area of stream ciphers. In this paper, we present the first application of DFA to the software eSTREAM candidate Rabbit that leads to a full secret key recovery. We show that by modifying modular additions of the next-state ...
Pomaranch is a synchronous, hardware-oriented stream cipher submitted to eSTREAM, the ECRYPT Stream Cipher Project. The cipher is designed as a cascade clock-controlled key-stream generator built on jump registers. This paper presents a discussion over the attacks on Pomaranch discovered so far. Particular focus is made on a new inherent property of jump registers that allows to construct their...
We investigate three side channel attacks on ABSG, a variant of irregularly decimated generators (IDG). The three attacks are timing analysis, phase-shift fault analysis and bit-flipping fault analysis. We also modify the attacks to non side-channel cryptanalyses, but on the assumption that the key/IV mixing is not well designed. This paper hopes to provide more understanding on actual hardware...
Drawing parallels to the field of anti-matter in modern physics the existence of anti-bits is postulated. The theory of bit and anti-bit pairs is developed and related experiments are designed that make use of high-speed bit stream collisions. Several circuits and a measurement system approach are described. Stream ciphers play an important role for the generation of the arbitrary high-speed bi...
TSC-4 is a T-function based stream cipher with 80-bit key, and proposed as a candidate for ECRYPT eStream project. In this paper, we introduce a differential method to analyze TSC-4. Our attack is based on the vulnerable differential characteristics in the state initialization of TSC-4, and for the chosen IV pairs, the differential probability is up to 2−15.40 in the case of weak keys. We show ...
constructing compact HMAC (Hash-based Message Authentication Code) is required to maintain integrity and authentication in computationally constrained environments like Wireless sensor networks and RFID. DECIM is a hardware oriented stream cipher submitted to the ECRYPT stream cipher project. It is highly scrutinized stream cipher and is portable to implement hashing for highly compact MAC, whi...
In this paper, we present Decim, a stream cipher hardwareoriented selected for the phase 3 of the ECRYPT stream cipher project eSTREAM. As required by the initial call for hardware-oriented stream cipher contribution, Decim manages 80-bit secret keys and 64-bit public initialization vectors. The design of Decim combines two filtering mechanisms: a nonlinear Boolean filter over a LFSR, followed ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید