Stream ciphers are symmetric key cryptosystems that are used commonly to provide confidentiality for a wide range of applications; such as mobile phone, pay TV and Internet data transmissions. This research examines the features and properties of the initialisation processes of existing stream ciphers to identify flaws and weaknesses, then presents recommendations to improve the security of future cipher designs.\ud \ud This research investigates well-known stream ciphers: A5/1, Sfinks and the Common Scrambling Algorithm Stream Cipher (CSA-SC). This research focused on the security of the initialisation process. The recommendations given are based on both the results in the literature and the work in this thesis
Both stream ciphers and block ciphers can be used to provide data confidentiality service. Stream ci...
This paper provides a fresh analysis of the widely-used Common Scrambling Algorithm Stream Cipher (C...
Currently, there are no stream ciphers which have been adopted as international standards. Most stre...
The initialisation process is a key component in modern stream cipher design. A well-designed initia...
The Common Scrambling Algorithm Stream Cipher (CSASC) is a shift register based stream cipher design...
[[abstract]]Stream cipher is an important device of the GSM system. A secure stream cipher is based ...
The main objective of this paper is to review the current status of stream cipher standardisation. T...
When designing symmetric ciphers, security and performance are of utmost importance. When selecting ...
Summary form only given. When designing symmetric ciphers, security and performance are of utmost im...
A5-GMR-1 is a synchronous stream cipher used to provide confidentiality for communications between s...
Sfinks is a shift register based stream cipher designed for hardware implementation and submitted to...
In recent years, the initialization vector (IV) setup has proven to be the most vulnerable point whe...
The main objective of this thesis is to examine the trade-offs between security and efficiency with...
Abstract: In this paper three newly proposed stream ciphers S1, S2 and S3 are analyzed. These stream...
Lightweight ciphers are defined as symmetric ciphers. They could be categorized into stream and bloc...
Both stream ciphers and block ciphers can be used to provide data confidentiality service. Stream ci...
This paper provides a fresh analysis of the widely-used Common Scrambling Algorithm Stream Cipher (C...
Currently, there are no stream ciphers which have been adopted as international standards. Most stre...
The initialisation process is a key component in modern stream cipher design. A well-designed initia...
The Common Scrambling Algorithm Stream Cipher (CSASC) is a shift register based stream cipher design...
[[abstract]]Stream cipher is an important device of the GSM system. A secure stream cipher is based ...
The main objective of this paper is to review the current status of stream cipher standardisation. T...
When designing symmetric ciphers, security and performance are of utmost importance. When selecting ...
Summary form only given. When designing symmetric ciphers, security and performance are of utmost im...
A5-GMR-1 is a synchronous stream cipher used to provide confidentiality for communications between s...
Sfinks is a shift register based stream cipher designed for hardware implementation and submitted to...
In recent years, the initialization vector (IV) setup has proven to be the most vulnerable point whe...
The main objective of this thesis is to examine the trade-offs between security and efficiency with...
Abstract: In this paper three newly proposed stream ciphers S1, S2 and S3 are analyzed. These stream...
Lightweight ciphers are defined as symmetric ciphers. They could be categorized into stream and bloc...
Both stream ciphers and block ciphers can be used to provide data confidentiality service. Stream ci...
This paper provides a fresh analysis of the widely-used Common Scrambling Algorithm Stream Cipher (C...
Currently, there are no stream ciphers which have been adopted as international standards. Most stre...