The Common Scrambling Algorithm Stream Cipher (CSASC) is a shift register based stream cipher designed to encrypt digital video broadcast. CSA-SC produces a pseudo-random binary sequence that is used to mask the contents of the transmission. In this paper, we analyse the initialisation process of the CSA-SC keystream generator and demonstrate weaknesses which lead to state convergence, slid pairs and shifted keystreams. As a result, the cipher may be vulnerable to distinguishing attacks, time-memory-data trade-off attacks or slide attacks
International audienceThe accessibility to the internal IP cores of Systems on Chip (SoC) provided b...
The paper presents a new statistical bias in the distribution of the first two output bytes of the R...
Abstract—The coset encoding scheme for the wiretap channel depends primarily on generating a random ...
This paper provides a fresh analysis of the widely-used Common Scrambling Algorithm Stream Cipher (C...
Stream ciphers are symmetric key cryptosystems that are used commonly to provide confidentiality for...
The initialisation process is a key component in modern stream cipher design. A well-designed initia...
Sfinks is a shift register based stream cipher designed for hardware implementation and submitted to...
A5-GMR-1 is a synchronous stream cipher used to provide confidentiality for communications between s...
Digital Video Broadcasting (DVB) is a set of standards for digital television. DVB supports the encr...
Due to the latest changes in observing the external network related threats within the stream cipher...
National audienceScan chains offer facilities to steal secret information embedded in a circuit. For...
[[abstract]]Stream cipher is an important device of the GSM system. A secure stream cipher is based ...
Currently, there are no stream ciphers which have been adopted as international standards. Most stre...
International audienceCipher algorithms have been created a long time ago to protect sensitive infor...
Abstract — in cryptography stream ciphers used to encrypt plain text data bits one by one. The secur...
International audienceThe accessibility to the internal IP cores of Systems on Chip (SoC) provided b...
The paper presents a new statistical bias in the distribution of the first two output bytes of the R...
Abstract—The coset encoding scheme for the wiretap channel depends primarily on generating a random ...
This paper provides a fresh analysis of the widely-used Common Scrambling Algorithm Stream Cipher (C...
Stream ciphers are symmetric key cryptosystems that are used commonly to provide confidentiality for...
The initialisation process is a key component in modern stream cipher design. A well-designed initia...
Sfinks is a shift register based stream cipher designed for hardware implementation and submitted to...
A5-GMR-1 is a synchronous stream cipher used to provide confidentiality for communications between s...
Digital Video Broadcasting (DVB) is a set of standards for digital television. DVB supports the encr...
Due to the latest changes in observing the external network related threats within the stream cipher...
National audienceScan chains offer facilities to steal secret information embedded in a circuit. For...
[[abstract]]Stream cipher is an important device of the GSM system. A secure stream cipher is based ...
Currently, there are no stream ciphers which have been adopted as international standards. Most stre...
International audienceCipher algorithms have been created a long time ago to protect sensitive infor...
Abstract — in cryptography stream ciphers used to encrypt plain text data bits one by one. The secur...
International audienceThe accessibility to the internal IP cores of Systems on Chip (SoC) provided b...
The paper presents a new statistical bias in the distribution of the first two output bytes of the R...
Abstract—The coset encoding scheme for the wiretap channel depends primarily on generating a random ...