This paper proposes a stream cipher with the advantages of efficiency and non-linearity of a key stream to against eavesdroppers invading communication protocols. Three transformations, KeyStream, DataHiding and SecureNonce, based on segmenting, XORing, and shifting operations are used to generate a sequence of variable key-stream numbers and ciphertext, respectively. Five different types of plaintext files are simulated by C language codes, where their encrypting time, the sizes of key streams, and the sizes of ciphertexts are listed. We also illustrate the distribution of a chosen plaintext and its ciphertext with the conditions of the secret key and the nonce slightly modified. The experimental results show that the generated sequence of...
Summary form only given. When designing symmetric ciphers, security and performance are of utmost im...
Abstract. Almost all the existing stream ciphers are using two inputs: a secret key and an initial v...
The main objective of this thesis is to examine the trade-offs between security and efficiency with...
In the world of cryptography, stream ciphers are known as primitives used to ensure privacy over a c...
PudgyTurtle is a way to use keystream to encode plaintext before XOR-based (stream cipher-like) encr...
Both stream ciphers and block ciphers can be used to provide data confidentiality service. Stream ci...
Many modern stream ciphers consist of a keystream generator and a key schedule algorithm. In fielded...
Most proposed stream ciphers are cracked through vulnerability of input and output. This paper is fo...
Both stream ciphers and block ciphers can be used to provide data confidentiality service. Stream ci...
We introduce a new construction method of diffusion layers for Substitution Permutation Network (SPN...
Stream ciphers are counted as an important part of symmetric encryption method. Their basic idea com...
Confidentiality is a security service that keeps the information from all but those authorized to ha...
Stream ciphers are counted as an important part of symmetric encryption method. Their basic idea com...
Abstract — in cryptography stream ciphers used to encrypt plain text data bits one by one. The secur...
Abstract—SOSEMANUK is a new synchronous software-oriented stream cipher with a variable-length key b...
Summary form only given. When designing symmetric ciphers, security and performance are of utmost im...
Abstract. Almost all the existing stream ciphers are using two inputs: a secret key and an initial v...
The main objective of this thesis is to examine the trade-offs between security and efficiency with...
In the world of cryptography, stream ciphers are known as primitives used to ensure privacy over a c...
PudgyTurtle is a way to use keystream to encode plaintext before XOR-based (stream cipher-like) encr...
Both stream ciphers and block ciphers can be used to provide data confidentiality service. Stream ci...
Many modern stream ciphers consist of a keystream generator and a key schedule algorithm. In fielded...
Most proposed stream ciphers are cracked through vulnerability of input and output. This paper is fo...
Both stream ciphers and block ciphers can be used to provide data confidentiality service. Stream ci...
We introduce a new construction method of diffusion layers for Substitution Permutation Network (SPN...
Stream ciphers are counted as an important part of symmetric encryption method. Their basic idea com...
Confidentiality is a security service that keeps the information from all but those authorized to ha...
Stream ciphers are counted as an important part of symmetric encryption method. Their basic idea com...
Abstract — in cryptography stream ciphers used to encrypt plain text data bits one by one. The secur...
Abstract—SOSEMANUK is a new synchronous software-oriented stream cipher with a variable-length key b...
Summary form only given. When designing symmetric ciphers, security and performance are of utmost im...
Abstract. Almost all the existing stream ciphers are using two inputs: a secret key and an initial v...
The main objective of this thesis is to examine the trade-offs between security and efficiency with...