The initialisation process is a key component in modern stream cipher design. A well-designed initialisation process should not reveal any information about the secret key, or possess properties that may help to facilitate attacks. This paper analyses the initialisation processes of shift register based stream ciphers and identifies four flaws which lead to compression, state convergence, the existence of slid pairs and possible weak Key-IV combinations. These flaws are illustrated using the A5/1 stream cipher as a case study. We also provide some design recommendations for the intialisation process in stream ciphers, to overcome these and other flaws
Stream ciphers are cryptographic primitives belonging to symmetric key cryptography to ensure data c...
The main objective of this thesis is to examine the trade-offs between security and efficiency with...
An improvement in the security of stream cipher is achieved by introducing dynamic polynomial switc...
Stream ciphers are symmetric key cryptosystems that are used commonly to provide confidentiality for...
In recent years, the initialization vector (IV) setup has proven to be the most vulnerable point whe...
A5/1 is a shift register based stream cipher which provides privacy for the GSM system. In this pape...
The Common Scrambling Algorithm Stream Cipher (CSASC) is a shift register based stream cipher design...
A5-GMR-1 is a synchronous stream cipher used to provide confidentiality for communications between s...
Sfinks is a shift register based stream cipher designed for hardware implementation and submitted to...
Well-designed initialisation and keystream generation processes for stream ciphers should ensure tha...
This paper presents an analysis of the stream cipher Mixer, a bit-based cipher with structural compo...
This thesis presents new cryptanalysis results for several different streamcipher constructions. In ...
Summary form only given. When designing symmetric ciphers, security and performance are of utmost im...
This is the author’s version of a work that was submitted/accepted for pub-lication in the following...
When designing symmetric ciphers, security and performance are of utmost importance. When selecting ...
Stream ciphers are cryptographic primitives belonging to symmetric key cryptography to ensure data c...
The main objective of this thesis is to examine the trade-offs between security and efficiency with...
An improvement in the security of stream cipher is achieved by introducing dynamic polynomial switc...
Stream ciphers are symmetric key cryptosystems that are used commonly to provide confidentiality for...
In recent years, the initialization vector (IV) setup has proven to be the most vulnerable point whe...
A5/1 is a shift register based stream cipher which provides privacy for the GSM system. In this pape...
The Common Scrambling Algorithm Stream Cipher (CSASC) is a shift register based stream cipher design...
A5-GMR-1 is a synchronous stream cipher used to provide confidentiality for communications between s...
Sfinks is a shift register based stream cipher designed for hardware implementation and submitted to...
Well-designed initialisation and keystream generation processes for stream ciphers should ensure tha...
This paper presents an analysis of the stream cipher Mixer, a bit-based cipher with structural compo...
This thesis presents new cryptanalysis results for several different streamcipher constructions. In ...
Summary form only given. When designing symmetric ciphers, security and performance are of utmost im...
This is the author’s version of a work that was submitted/accepted for pub-lication in the following...
When designing symmetric ciphers, security and performance are of utmost importance. When selecting ...
Stream ciphers are cryptographic primitives belonging to symmetric key cryptography to ensure data c...
The main objective of this thesis is to examine the trade-offs between security and efficiency with...
An improvement in the security of stream cipher is achieved by introducing dynamic polynomial switc...