Zobrazeno 1 - 10
of 654
pro vyhledávání: '"Stream cipher attack"'
Publikováno v:
Information Sciences. :228-239
Permutation is a commonly used operation in many secure multimedia systems . However, it is fragile against cryptanalysis when used alone. For instance, it is well-known that permutation-only multimedia encryption is insecure against known-plaintext
Autor:
Aly Mohamed El-Semary, Hossam Diab
Publikováno v:
Signal Processing. 142:53-68
This paper cryptanalyses the hyper-chaotic image encryption scheme developed by Norouzi et al. and presents a chosen-plain-image attack scenario to reveal its generated key stream. The recovered key stream can be used to decrypt any future related ci
Publikováno v:
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 36:1968-1977
Differential fault analysis of stream ciphers, such as Grain (Grain v1 and Grain-128) has been an active area of research. Several countermeasures to thwart such analysis have been also proposed in the related cryptographic literature. In this paper,
Publikováno v:
IET Information Security. 11:230-234
The Feistel-2 cipher is a type of Feistel ciphers proposed by Isobe and Shibutani at Asiacrypt 2013. Its round functions consist of a public F-function and a subkey XORed before the F-function. Recently, a variation of the Feistel-2 cipher, in which
Publikováno v:
Cryptography and Communications. 10:177-193
On-line ciphers are convenient building blocks for realizing efficient single- pass encryption. In particular, the trend to limit the consequences of nonce reuses rendered them popular in recent authenticated encryption schemes. While encryption sche
Publikováno v:
International Journal of Computer Applications. 172:24-29
Autor:
Souvik Ray, Goutam Paul
Publikováno v:
Designs, Codes and Cryptography. 86:1211-1247
We revisit the different approaches used in the literature to estimate the data complexity of distinguishing attacks on stream ciphers and analyze their inter-relationships. In the process, we formally argue which approach is applicable (or not appli
Autor:
Howard M. Heys
Publikováno v:
The Computer Journal. 60:1839-1851
Publikováno v:
IET Information Security. 11:139-145
The well-known stream cipher Grain-128a is the new version of Grain-128. While Grain-128 is vulnerable against several introduced attacks, Grain-128a is claimed to be secure against all known attacks and observations on Grain-128. So far the only pub
Publikováno v:
World Journal of Wireless Devices and Engineering. 1:25-30