Fruit is a small-state stream cipher designed for securing communications among resource-constrained devices. The design of Fruit was first known to the public in 2016. It was later improved as Fruit-80 in 2018 and becomes the latest and final version among all versions of the Fruit stream ciphers. In this paper, we analyze the Fruit-80 stream cipher. We found that Fruit-80 generates identical keystreams from certain two distinct pairs of key and IV. Such pair of key and IV pairs is known as a slid pair. Moreover, we discover that when two pairs of key and IV fulfill specific characteristics, they will generate identical keystreams. This shows that slid pairs do not always exist arbitrarily in Fruit-80. We define specific rules which are eq...
eSTREAM brought to the attention of the cryptographic community a number of stream ciphers including...
This thesis deals with symmetric-key algorithms and more specifically block ciphers and stream ciphe...
The property that the stream cipher RC4 can generate the same keystream outputs under two different ...
Fruit is a small-state stream cipher designed for securing communications among resource-constrained...
In Fast Software Encryption (FSE) 2015, while presenting a new idea (i.e., the design of stream ciph...
In this modern era, computers are getting more lightweight and smaller in size. This advancement has...
In this paper, we study the security of Grain-like small state stream ciphers by fast correlation at...
After the introduction of some stream ciphers with the minimal internal state, the design idea of th...
In the conference “Fast Software Encryption 2015”, a new line of research was proposed by introducin...
In this paper, we analyze the Espresso cipher from a related key chosen IV perspective. More precise...
Stream ciphers are cryptographic primitives belonging to symmetric key cryptography to ensure data c...
Lizard is a lightweight stream cipher proposed by Hamann, Krause and Meier in IACR ToSC 2017. It has...
Plantlet is a lightweight stream cipher designed by Mikhalev, Armknecht and Müller in IACR ToSC 2017...
We introduce a new construction method of diffusion layers for Substitution Permutation Network (SPN...
Time-memory-data (TMD) tradeoff attacks limit the security level of many classical stream ciphers (l...
eSTREAM brought to the attention of the cryptographic community a number of stream ciphers including...
This thesis deals with symmetric-key algorithms and more specifically block ciphers and stream ciphe...
The property that the stream cipher RC4 can generate the same keystream outputs under two different ...
Fruit is a small-state stream cipher designed for securing communications among resource-constrained...
In Fast Software Encryption (FSE) 2015, while presenting a new idea (i.e., the design of stream ciph...
In this modern era, computers are getting more lightweight and smaller in size. This advancement has...
In this paper, we study the security of Grain-like small state stream ciphers by fast correlation at...
After the introduction of some stream ciphers with the minimal internal state, the design idea of th...
In the conference “Fast Software Encryption 2015”, a new line of research was proposed by introducin...
In this paper, we analyze the Espresso cipher from a related key chosen IV perspective. More precise...
Stream ciphers are cryptographic primitives belonging to symmetric key cryptography to ensure data c...
Lizard is a lightweight stream cipher proposed by Hamann, Krause and Meier in IACR ToSC 2017. It has...
Plantlet is a lightweight stream cipher designed by Mikhalev, Armknecht and Müller in IACR ToSC 2017...
We introduce a new construction method of diffusion layers for Substitution Permutation Network (SPN...
Time-memory-data (TMD) tradeoff attacks limit the security level of many classical stream ciphers (l...
eSTREAM brought to the attention of the cryptographic community a number of stream ciphers including...
This thesis deals with symmetric-key algorithms and more specifically block ciphers and stream ciphe...
The property that the stream cipher RC4 can generate the same keystream outputs under two different ...