搜索结果: 1-15 共查到“军队指挥学 Stream Cipher”相关记录69条 . 查询时间(0.06 秒)
Message Authentication (MAC) Algorithm For The VMPC-R (RC4-like) Stream Cipher
stream cipher RC4 VMPC-R
2019/1/18
We propose an authenticated encryption scheme for the VMPC-R stream cipher. VMPC-R is an RC4-like algorithm proposed in 2013. It was created in a challenge to find a bias-free cipher within the RC4 de...
Tight Security Bounds for Generic Stream Cipher Constructions
Stream Ciphers Generic Time-Memory-Data Tradeoff Attacks Security Lower Bound Proofs
2019/1/9
The design of modern stream ciphers is strongly influenced by the fact that Time-Memory-Data tradeoff attacks (TMD-TO attacks) reduce their effective key length to SL/2SL/2, where SLSL denotes the inn...
In this paper we are proposing a new member in the SNOW family of stream ciphers, called SNOW-V. The motivation is to meet an industry demand of very high speed encryption in a virtualized environment...
Fast Near Collision Attack on the Grain v1 Stream Cipher
Cryptanalysis Stream ciphers Grain
2018/2/9
Modern stream ciphers often adopt a large internal state to resist various attacks, where the cryptanalysts have to deal with a large number of variables when mounting state recovery attacks. In this ...
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN
CAESAR Authenticated Encryption Cube Attack
2016/12/12
The cube attack is an algebraic attack that allows an adversary to extract low degree polynomial equations from the targeted cryptographic primitive. This work applies the cube attack to a reduced rou...
We estimate that Spritz can produce output with about 24 cycles/byte of computation. Furthermore, our statistical tests suggest that about 281281 bytes of output are needed before one can reasonably d...
In this paper we explore the intriguing factors involved in the non one-one nature of the RC4, and explore new techniques and present interesting findings regarding the same. The first part of this pa...
LIZARD - A Lightweight Stream Cipher for Power-constrained Devices
Stream Ciphers Lightweight Cryptography Time-Memory-Data Tradeoff Attacks
2016/12/8
Time-memory-data (TMD) tradeoff attacks limit the security level of many classical stream ciphers (like E0, A5/1, Trivium, Grain) to n/2n/2, where nn denotes the inner state length of the underlying k...
Fruit: Ultra-Lightweight Stream Cipher with Shorter Internal State
Stream cipher ultra-lightweight Lightweight
2016/4/12
In eSTREAM project, a few lightweight stream cipher for hardware was introduced
(2008) and then in FSE 2015 Sprout was proposed. Sprout introduced a new idea,
design of stream cipher with shorter in...
Spritz is a stream cipher proposed by Rivest and Schuldt at
the rump session of CRYPTO 2014. It is intended to be a replacement of
the popular RC4 stream cipher. In this paper we propose distinguish...
RC4 is the most widely used stream cipher around. A lot of modifications of RC4 cipher can be seen in open literature. Most of them enhance the secrecy of the cipher and the security levels have been ...
Linear Sequential Circuit Approximation of Acterbahn Stream Cipher
Linear Distinguishing Attack Linear Sequential Circuit Approximation Achterbahn Stream Cipher
2016/1/23
Achterbahn stream cipher is proposed as a candidate for ECRYPT eSTREAM project which deals with key of length 80-bit. The linear distinguishing attack,which aims at distinguishing the keystream from p...
A practical state recovery attack on the stream cipher Sablier v1
CAESAR stream ciphers Sablier
2016/1/23
Sablier is an authenticated encryption cipher submitted to the CAESAR competition, which is composed of the encryption Sablier v1 and the authentication Au. In this work we present a state recovery ...
A Probabilistic Algebraic Attack on the Grain Family of Stream Cipher
Boolean Function Grain v1 Grain-128a
2016/1/8
In 2005, Hell, Johansson and Meier submitted a stream cipher proposal named Grain
v1 to the estream call for stream cipher proposals and it also became one estream finalists in the
hardware category...
THE NEW HEURISTIC GUESS AND DETERMINE ATTACK ON SNOW 2.0 STREAM CIPHER
Cryptanalysis Stream cipher Guess Determine attack
2016/1/8
SNOW 2.0 is a word oriented stream cipher that has been selected as a standard stream cipher on ISO/IEC
18033-4. One of the general attacks on the stream ciphers is Guess and Determine attack. Heuris...