Fruit is a small-state stream cipher designed for securing communications among resource-constrained devices. The design of Fruit was first known to the public in 2016. It was later improved as Fruit-80 in 2018 and becomes the latest and final version among all versions of the Fruit stream ciphers. In this paper, we analyze the Fruit-80 stream cipher. We found that Fruit-80 generates identical keystreams from certain two distinct pairs of key and IV. Such pair of key and IV pairs is known as a slid pair. Moreover, we discover that when two pairs of key and IV fulfill specific characteristics, they will generate identical keystreams. This shows that slid pairs do not always exist arbitrarily in Fruit-80. We define specific rules which are eq...
The property that the stream cipher RC4 can generate the same keystream outputs under two different ...
This thesis deals with symmetric-key algorithms and more specifically block ciphers and stream ciphe...
Many modern stream ciphers consist of a keystream generator and a key schedule algorithm. In fielded...
In this modern era, computers are getting more lightweight and smaller in size. This advancement has...
In Fast Software Encryption (FSE) 2015, while presenting a new idea (i.e., the design of stream ciph...
In this paper, we analyze the Espresso cipher from a related key chosen IV perspective. More precise...
In this paper, we study the security of Grain-like small state stream ciphers by fast correlation at...
After the introduction of some stream ciphers with the minimal internal state, the design idea of th...
Lizard is a lightweight stream cipher proposed by Hamann, Krause and Meier in IACR ToSC 2017. It has...
Stream ciphers are cryptographic primitives belonging to symmetric key cryptography to ensure data c...
The property that the stream cipher RC4 can generate the same keystream outputs under two different ...
We introduce a new construction method of diffusion layers for Substitution Permutation Network (SPN...
Plantlet is a lightweight stream cipher designed by Mikhalev, Armknecht and Müller in IACR ToSC 2017...
Time-memory-data (TMD) tradeoff attacks limit the security level of many classical stream ciphers (l...
In the conference “Fast Software Encryption 2015”, a new line of research was proposed by introducin...
The property that the stream cipher RC4 can generate the same keystream outputs under two different ...
This thesis deals with symmetric-key algorithms and more specifically block ciphers and stream ciphe...
Many modern stream ciphers consist of a keystream generator and a key schedule algorithm. In fielded...
In this modern era, computers are getting more lightweight and smaller in size. This advancement has...
In Fast Software Encryption (FSE) 2015, while presenting a new idea (i.e., the design of stream ciph...
In this paper, we analyze the Espresso cipher from a related key chosen IV perspective. More precise...
In this paper, we study the security of Grain-like small state stream ciphers by fast correlation at...
After the introduction of some stream ciphers with the minimal internal state, the design idea of th...
Lizard is a lightweight stream cipher proposed by Hamann, Krause and Meier in IACR ToSC 2017. It has...
Stream ciphers are cryptographic primitives belonging to symmetric key cryptography to ensure data c...
The property that the stream cipher RC4 can generate the same keystream outputs under two different ...
We introduce a new construction method of diffusion layers for Substitution Permutation Network (SPN...
Plantlet is a lightweight stream cipher designed by Mikhalev, Armknecht and Müller in IACR ToSC 2017...
Time-memory-data (TMD) tradeoff attacks limit the security level of many classical stream ciphers (l...
In the conference “Fast Software Encryption 2015”, a new line of research was proposed by introducin...
The property that the stream cipher RC4 can generate the same keystream outputs under two different ...
This thesis deals with symmetric-key algorithms and more specifically block ciphers and stream ciphe...
Many modern stream ciphers consist of a keystream generator and a key schedule algorithm. In fielded...