The GMR-2 cipher is a type of stream cipher currently being used in some Inmarsat satellite phones. It has been proven that such a cipher can be cracked using only one single-frame (15 bytes) known keystream but with a moderate executing times. In this paper, we present a new thorough security analysis of the GMR-2 cipher. We first study the inverse properties of the cipher\u27s components to reveal a bad one-way character of the cipher. By then introducing a new concept called ``valid key chain according to the cipher\u27s key schedule, we propose an unprecedented real-time inversion attack using a single-frame keystream. This attack comprises three phases: (1) table generation; (2) dynamic table look-up, filtration and combination; and (...
The F-FCSR stream cipher family has been presented a few years ago. Apart from some flaws in the ini...
A5/1 stream cipher is used in Global System for Mobile Communication(GSM) phones for secure communic...
The stream cipher WG-7 is a lightweight variant of the well-known Welch-Gong (WG) stream cipher fami...
Abstract-There is a rich body of work related to the security aspects of cellular mobile phones, in ...
A5-GMR-1 is a synchronous stream cipher used to provide confidentiality for communications between s...
Ergüler, İmran (Dogus Author)A5/1 and A5/2 are the GSM encryption algorithms that protect user data ...
[[abstract]]Stream cipher is an important device of the GSM system. A secure stream cipher is based ...
In Europe and North America, the most widely used stream cipher to ensure privacy and confiden...
International audienceThis paper presents the first publicly available cryptanalytic attacks on the ...
An attack on the A5/2 stream cipher algorithm is described, that determines the linear relations amo...
The A5/1 keystream generator as part of the GSM standard for mobile telephones is one of the most wi...
Abstract: In this paper three newly proposed stream ciphers S1, S2 and S3 are analyzed. These stream...
Abstract. In Europe and North America, the most widely used stream cipher to ensure privacy and conf...
This paper presents distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi,...
WG-7 is a stream cipher based on WG stream cipher and has been designed by Luo et al. (2010). This c...
The F-FCSR stream cipher family has been presented a few years ago. Apart from some flaws in the ini...
A5/1 stream cipher is used in Global System for Mobile Communication(GSM) phones for secure communic...
The stream cipher WG-7 is a lightweight variant of the well-known Welch-Gong (WG) stream cipher fami...
Abstract-There is a rich body of work related to the security aspects of cellular mobile phones, in ...
A5-GMR-1 is a synchronous stream cipher used to provide confidentiality for communications between s...
Ergüler, İmran (Dogus Author)A5/1 and A5/2 are the GSM encryption algorithms that protect user data ...
[[abstract]]Stream cipher is an important device of the GSM system. A secure stream cipher is based ...
In Europe and North America, the most widely used stream cipher to ensure privacy and confiden...
International audienceThis paper presents the first publicly available cryptanalytic attacks on the ...
An attack on the A5/2 stream cipher algorithm is described, that determines the linear relations amo...
The A5/1 keystream generator as part of the GSM standard for mobile telephones is one of the most wi...
Abstract: In this paper three newly proposed stream ciphers S1, S2 and S3 are analyzed. These stream...
Abstract. In Europe and North America, the most widely used stream cipher to ensure privacy and conf...
This paper presents distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi,...
WG-7 is a stream cipher based on WG stream cipher and has been designed by Luo et al. (2010). This c...
The F-FCSR stream cipher family has been presented a few years ago. Apart from some flaws in the ini...
A5/1 stream cipher is used in Global System for Mobile Communication(GSM) phones for secure communic...
The stream cipher WG-7 is a lightweight variant of the well-known Welch-Gong (WG) stream cipher fami...