Dissertations / Theses on the topic 'Cipher'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Cipher.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Torre, Gabrielle-Ann. "Cipher." Thesis, The University of Arizona, 2014. http://hdl.handle.net/10150/322065.
Full textAghaee, Saeed. "Random Stream Cipher." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-1511.
Full textStream ciphers are counted as an important part of symmetric encryption method. Their basic idea comes from One-Time-Pad cipher using XOR operator on the plain text and the key to generate the cipher. The present work brings a new idea in symmetric encryption method, which inherits stream key generation idea from synchronous stream cipher and uses division instead of xoring. The Usage of division to combine the plain text with stream key gives numerous abilities to this method that the most important one is using random factors to produce the ciphers.
Raunig, Gerald. "Cipher and Dividuality." Universität Leipzig, 2020. https://ul.qucosa.de/id/qucosa%3A71582.
Full textNolan, Eric. "Chuck Chonson American cipher /." [Gainesville, Fla.]: University of Florida, 2003. http://purl.fcla.edu/fcla/etd/UFE0000759.
Full textAlhamdan, Ali Abdulaziz. "Secure stream cipher initialisation processes." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/66721/1/Ali%20Abdulaziz%20H_Al%20Hamdan_Thesis.pdf.
Full textBose, Gourav. "The 128-bit block cipher MARS." FIU Digital Commons, 2003. http://digitalcommons.fiu.edu/etd/1770.
Full textXu, Jinzhong. "Stream Cipher Analysis Based on FCSRs." UKnowledge, 2000. http://uknowledge.uky.edu/gradschool_diss/320.
Full textFarmani, Mohammad. "Threshold Implementations of the Present Cipher." Digital WPI, 2017. https://digitalcommons.wpi.edu/etd-theses/1024.
Full textMcKague, Matthew. "Design and Analysis of RC4-like Stream Ciphers." Thesis, University of Waterloo, 2005. http://hdl.handle.net/10012/1141.
Full textYilmaz, Erdem. "Two Versions Of The Stream Cipher Snow." Master's thesis, METU, 2004. http://etd.lib.metu.edu.tr/upload/12605592/index.pdf.
Full textguess-and-determine attack&rdquo
s by Hawkes and Rose and the &ldquo
distinguishing attack&rdquo
by Coppersmith, Halevi and Jutla in 2002. A review of the distinguishing attack on SNOW1.0 is given using the approach made by the designers of SNOW in 2002 on another cipher, SOBER-t32. However, since the calculation methods for the complexities of the attack are different, the values found with the method of the designers of SNOW are higher than the ones found by Coppersmith, Halevi and Jutla. The correlations in the finite state machine that make the distinguishing attack possible and how these correlations are affected by the operations in the finite state machine are investigated. Since the substitution boxes (S-boxes) play an important role in destroying the correlation and linearity caused by Linear Feedback Shift Register, the s-boxes of the two versions of SNOW are examined for the criteria of Linear Approximation Table (LAT), Difference Distribution Table (DDT) and Auto-correlation Table distributions. The randomness tests are performed using NIST statistical test suite for both of the ciphers. The results of the tests are presented.
Madhavarapu, Venkata Praveen Kumar. "A Novel Three Phase Symmetric Cipher Technique." OpenSIUC, 2016. https://opensiuc.lib.siu.edu/theses/2031.
Full textSiegenthaler, Thomas. "Methoden für den Entwurf von stream cipher-Systemen /." [S.l.] : [s.n.], 1986. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=8185.
Full textFjellskaalnes, Stig. "FPGA realization of a public key block cipher." Thesis, Norges Teknisk-Naturvitenskaplige Universitet, Institutt for datateknikk og informasjonsvitenskap, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9086.
Full textThis report will cover the physical realization of a public key algorithm based on multivariate quadratic quasigroups. The intension is that this implementation will use real keys and data. Efforts are also taken in order to reduce area cost as much as possible. The solution will be described and analyzed. This will show wether the measures were successfull or not.
El, Omer. "Avalanche Properties And Randomness Of The Twofish Cipher." Master's thesis, METU, 2004. http://etd.lib.metu.edu.tr/upload/12605571/index.pdf.
Full texts results. The strength of the cipher to cryptanalytic attacks is investigated by measuring its randomness according to the avalanche criterion. The avalanche criterion results are compared with those of the Statistical Test Suite of the NIST and discrepancies in the second and third rounds are explained theoretically.
ALMashrafi, Mufeed Juma. "Analysis of stream cipher based authenticated encryption schemes." Thesis, Queensland University of Technology, 2012. https://eprints.qut.edu.au/60916/1/Mufeed_ALMashrafi_Thesis.pdf.
Full textGan, Lin. "A new stream cipher for secure digital media distribution." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2002. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ65620.pdf.
Full textJeddi, Zahra. "A Lightweight Authenticated Symmetric Encryption Cipher for RFID Systems." Thesis, University of Louisiana at Lafayette, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3687692.
Full textRadio Frequency Identification, RFID, is a type of automatic identification system which has gained popularity in recent years for being fast and reliable in keeping track of individual objects. Due to limited available resources in RFID tags, providing privacy and security for RFID systems is one of the important challenges nowadays. In this dissertation, a lightweight symmetric encryption algorithm called RBS, Redundant Bit Security, is presented which is suitable for resource constrained applications like RFID systems. Confidentiality of the plaintext in this algorithm is achieved through inserting some redundant bits inside the plaintext bits where the location of redundant bits inside the ciphertext is the secret key shared between sender and receiver. Besides confidentiality, these redundant bits are calculated in such a way that they provide authentication and integrity as well. The security of the algorithm is analyzed against some well-known attacks such as known plaintext, known ciphertext, chosen plaintext, and differential attacks. Experimental and simulation results confirm that RBS implementation requires less power and area overhead compared to other known symmetric algorithms proposed for RFID systems, especially when the authentication is essential like in harsh environments.
Odelberg, David, and Carl Rasmus Holm. "Distributed cipher chaining for increased security in password storage." Thesis, Linköpings universitet, Datorteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-107484.
Full textQahur, Al Mahri Hassan Musallam Ahmed. "Analysis of selected block cipher modes for authenticated encryption." Thesis, Queensland University of Technology, 2018. https://eprints.qut.edu.au/119361/1/Hassan%20Musallam%20Ahmed_Qahur%20Al%20Mahri_Thesis.pdf.
Full textCivino, Roberto. "Differential attacks using alternative operations and block cipher design." Doctoral thesis, Università degli studi di Trento, 2018. https://hdl.handle.net/11572/368586.
Full textCivino, Roberto. "Differential attacks using alternative operations and block cipher design." Doctoral thesis, University of Trento, 2018. http://eprints-phd.biblio.unitn.it/2808/2/Roberto_Civino_-_PhD_Dissertation_PDFVersion.pdf.
Full textDi, Binbin. "Analysis of one-pass block cipher based authenticated encryption schemes." Thesis, Queensland University of Technology, 2015. https://eprints.qut.edu.au/87437/1/Binbin_Di_Thesis.pdf.
Full textDatta, Avijit. "Exploring new approaches towards design of block cipher testing algorithms." Thesis, University of North Bengal, 2019. http://ir.nbu.ac.in/handle/123456789/3638.
Full textYildirim, Hamdi Murat. "Algebraic Properties Of The Operations Used In Block Cipher Idea." Phd thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/3/12608289/index.pdf.
Full textn-1$. We list all linear relations which make the nonlinearity of $mathbf {f}_z$ and $mathbf {g}_z$ zero and furthermore, we present all linear relations for $mathbf {g}_z$ having a high probability. We use these linear relations to derive many more linear relations for 1-round IDEA. We also devise also a new algorithm to find a set of new linear relations for 1-round IDEA based on known linear relations. Moreover, we extend the largest known linear class of weak keys with cardinality $2^{23}$ to two classes with cardinality $2^{24}$ and $2^{27}$. Finally, we obtain several interesting properties of the set $ { ({mathbf X},{mathbf X} BIGoplus {mathbf A}) in mathbb Z_2^n times mathbb Z_2^n ,|, (mathbf {X}BJoin {mathbf Z})BIGoplus( ({mathbf X} BIGoplus {mathbf A} ) BJoin mathbf {Z} ) = {mathbf B} }$ for varying ${mathbf A}, {mathbf B}$ and ${mathbf Z}$ in $mathbb Z_2^n$, where $BJoin in { BIGodot,BIGboxplus }$. By using some of these properties, we present impossible differentials for 1-round IDEA and Pseudo-Hadamard Transform.
Lefebvre, Haidee. "B-boy (dance) cipher: an innovative knowledge community's shared activity." Thesis, McGill University, 2012. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=106265.
Full textMon étude porte sur le b-boying (break boy, danseur), archétype de la danse hip-hop, pour dégager l'enseignement et les procédés d'apprentissage informels inhérents aux cercles de danse improvisée – création libre (freestyle ou raw cipher). Ma méthodologie intègre certains aspects d'observation participante selon la trajectoire de recherche s'intéressant à l'influence des pratiques hip-hop sur les façons de faire et de penser. Ceci oriente mon observation participante de 13 événements et mon entrevue en profondeur avec Buddha, de la plus ancienne troupe de breaking du Canada, Canadian Floor Masters. Mon cadre théorique s'appuie sur l'apprentissage situé de Lave et Wenger, et la création du savoir de Nonaka. J'analyse le cercle de danse comme lieu permettant de s'ouvrir consciemment au changement, constatant que : 1) il existe une corrélation entre l'apprentissage situé et la création du savoir; 2) la création du savoir et les pratiques hip-hop sont interreliées; 3) la culture b-boy évoque une communauté de savoir novatrice partageant des connaissances personnelles pour générer et faire progresser un savoir collectif. Mon approche aiderait les éducateurs à mieux comprendre comment cette activité de quartier créée il y a trente ans, par et pour des jeunes du South Bronx, s'est transformée en pratique réalisée et consommée à l'échelle du globe par les jeunes et les adultes contemporains.
Lowenrud, Richard, and Jacob Kimblad. "Implementation and Evaluation of Espresso Stream Cipher in 65nm CMOS." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-204620.
Full textMed de kommande 5G nätverken och den förväntade tillväxten av Internet of Things (IoT) kommer efterfrågan på snabba och pålitliga krypteringsalgoritmer att öka. Eftersom många system kan vara tidskritiska och drivas av interna kraftkällor måste algoritmerna vara små, snabba, energieffektiva och ha låg latens. Ett nytt strömchiffer vid namn Espresso har föreslagits som ett svar på dessa krav och har optimiserats för flera parametrar till skillnad från andra strömchiffer såsom Trivium och Grain. Espresso har tidigare jämförts med branschstandarden, Advanced Encryption Standard (AES), i en FPGA implementation och visat lovande resultat för strömförbrukning men ytterligare tester måste utföras för att få kunskap om algoritmens egenskaper. Syftet med detta examensarbete är att implementera och utvärdera Espresso i 65nm CMOS teknologi och jämföra den med AES. Espresso implementeras i flera konfigurationer i VHDL som optimiserar för storlek och latens. Implementationerna jämförs sedan med AES i area, genomströmning, energieffektivitet och latens genom simulering. Detta görs med hjälp av UMC 65nm CMOS biblioteket och Synopsys Design Vision. Resultaten visar att Espresso implementerad med sekventiell laddning av nyckel och IV är 18.2x mindre, 3.2x snabbare, använder 9.4x mindre ström och har 1.5x mindre latens än AES. När Espresso implementeras med full parallel laddning är den fortfarande 13.6x mindre, 3.2x snabbare, drar 7.1x mindre ström men har samtidigt 3.2x lägre latens än AES. Espresso’s energieffektivitet kan förbättras ytterligare genom att applicera strömsparande tekniker, även om vissa tekniker såsom clock gating och power gating har begränsad användbarhet på grund av strömchiffers natur.
Albrecht, Martin. "Algorithmic algebraic techniques and their application to block cipher cryptanalysis." Thesis, Royal Holloway, University of London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.529770.
Full textMa, Fei Chun. "A Diophantine equations based cipher for Internet EDI security in Macau." Thesis, University of Macau, 1997. http://umaclib3.umac.mo/record=b1445591.
Full textKopčan, Marek. "Simulace a analýza provozu blokové šifry se statistickou samosynchronizací." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217308.
Full textHenricksen, Matthew. "Design, Implementation and Cryptanalysis of Modern Symmetric Ciphers." Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16055/1/Matt_Henricksen_Thesis.pdf.
Full textHenricksen, Matthew. "Design, Implementation and Cryptanalysis of Modern Symmetric Ciphers." Queensland University of Technology, 2005. http://eprints.qut.edu.au/16055/.
Full textLIN, PING-HSIEN, and 林秉賢. "Study of Fast Stream Cipher based on Block Cipher Stream Modes." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/66pe5a.
Full textLin, Michael C. J., and 林志璟. "A Blowfish Cipher Chip." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/37130241041477804505.
Full text國立清華大學
資訊工程學系
87
We propose an efficient hardware architecture for the Blowfish encryption/ decryption algorithm. The architecture can achieve high-speed data transfer up to 4 bits per clock, which is 9 times faster than a Pentium. Although the Blowfish algorithm consists of a loop iterating 16 rounds and the block size is 64 bits, the I/O of the proposed architecture is reduced to 4 bits, and the I/O port is serialized. By applying operator-rescheduling method, the critical path delay is improved by 21.7%. Besides, Design for Testability (DFT) is also considered. To prove the correctness of the proposed architecture, we have successfully implemented it using Compass cell library targeted at a 0.6 mm TSMC SPTM CMOS process. The die size is 5.7x6.1 mm2 and the maximum frequency is 50MHz. This Blowfish cipher chip can be applied to such areas as a security system for high-speed networks.
Yang, Yuh-Sheng, and 楊育昇. "An Extended Product Cipher." Thesis, 1996. http://ndltd.ncl.edu.tw/handle/04867904648216460715.
Full text國立交通大學
資訊工程學系
84
In this paper, we propose an extended version of product ciphers. The extendedproduct ciphers adopt not only transposition ciphers and substitution ciphersas their building blocks, but available ciphers can also be incorporated underconditions that type transformation algorithms are available. Some algorithmsare offered to transform generic ciphers into practicable building blocks ofextended product ciphers.
李明和. "A Gbps AES Cipher." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/54560364848496704120.
Full text國立清華大學
資訊工程學系
89
We propose an efficient hardware architecture of the AES encryption/decryption algorithm. The architecture can achieve high-speed data transfer up to 8 bits/cycles, which is 15 times faster than a Pentium III 600. In our design, the I/O of the proposed architecture is reduced to 8 bits and the I/O port is serialized. It provides a simple and useful I/O interface for host. A better methodology of key schedule is involved. A pipeline stage doubles the performance. Besides, DFT is also considered. We have successfully implemented it using Compass cell library targeted at 0.35μm TSMC SPTM CMOS process. The die size of the chip is 4.5x4.5 mm2, and the maximum frequency is up to 125MHz. This AES cipher can be applied to such areas as a security for gigabit speed networks.
Chen, Wei-Kwei, and 陳維魁. "A modified Playfair cipher." Thesis, 1993. http://ndltd.ncl.edu.tw/handle/34323356523541704851.
Full text國立交通大學
資訊工程研究所
81
The Playfair cipher has two major shortcomings. First, inserted or appended null letters (or infrequently used letters) sometimes make the meaning of the recovered plaintext string difficult to determine. Second, if an intruder collects enough plaintext-ciphertext pairs, then it is possible for him to use this information to derive the encryption/decryption key. Thus, the Playfair cipher cannot withstand chosen plaintext-ciphertext attacks. To remedy the shortcomings of the Playfair cipher, we propose a modified Playfair cipher. In our method, we first append a random string of fixed length to the beginning of the plaintext string to obtain an immediate plaintext string. We then convert the immediate plaintext string into an integer and use a different base to translate this integer into another one. Last, we apply enciphering rules to produce the ciphertext string. The ciphertext string generated from the modified Playfair cipher is more secure against possible attacks.
Yang, Fang. "Analysis and implementation of statistical cipher feedbac mode and optimized cipher feedback mode /." 2004.
Find full textStoler, Max Samuel. "Re-engineering the Enigma cipher." 2008. http://etd.louisville.edu/data/UofL0435t2008.pdf.
Full textTitle and description from thesis home page (viewed September 12, 2008). Department of Computer Engineering and Computer Science. "July 2008." Includes bibliographical references (p. 56-58).
Chih, Chu Te, and 朱德智. "An Improvement of Hill Cipher." Thesis, 1993. http://ndltd.ncl.edu.tw/handle/71700187081939569849.
Full text國立交通大學
資訊管理研究所
81
The purpose of our research is that we will find an improved Hill Cipher which has a better protection. This scheme, of course,can keep the characteristics of the Hill Cipher and can prevent the Chosen-Plaintext Attack. We also hope that this scheme can be widely accepted and applied for protecting private data, data transmitting on the network, or any application the private key cryptography can apply. In this paper,we collect the relative papers from journals, books, and conference papers. From these papers, we categorize three basic methods related to improve Hill Cipher. We propose an improved method to promise the degree of security. Finally, we compare these methods.
Neto, Nicolas dos Santos. "BSC - Bloom based stream cipher." Master's thesis, 2018. http://hdl.handle.net/10773/28300.
Full textUm Linear Feedback Shift Register (LFSR) é um elemento base usado frequentemente para desenvolver cifras contínuas, baseadas em hardware, de forma rápida. Contudo, pelo facto de serem orientados ao bit tornam-se ineficientes quando implementadas em microprocessadores. Por outro lado, os LFSRs têm um comportamento bem conhecido, definido pelo seu polinómio de realimentação, o que facilita a análise das suas propriedades com recurso a ferramentas matemáticas mas também a sua cripto análise. Este trabalho consistiu na criação de um LFSR generalizado cujos registos possuem palavras de 64 bits em vez de um único. Utiliza-se também um polinómio de realimentação variável, com vista a dificultar a sua criptanalise. A variabilidade do gerador é definida por um filtro de Bloom. Um filtro de Bloom é um método bem conhecido para detetar possı́veis repetições de um valor e é utilizado neste gerador com vista a torná-lo difı́cil de analisar devido ao seu estado em constante modificação. O estado do filtro é cı́clico, visto que em algumas iterações acumula uns (1’s) enquanto que nas seguintes acumula zeros (0’s). O número de iterações em cada caso varia com o número de colisões detetados pelo próprio filtro.
Mestrado em Engenharia de Computadores e Telemática
Lee, Po Tung, and 李柏桐. "An implementation of the YGS cipher." Thesis, 1995. http://ndltd.ncl.edu.tw/handle/14580665495144832132.
Full text國立交通大學
資訊工程研究所
83
Primarily,the Graham-Shamir Knapsack Cipher is proposed to obscure the superincreasing property of trapdoor information. After analysizing it, we find that it can be broken if we prepare the suitable plaintext message and its corresponding ciphertext message pairs.The Graham-Shamir Knapsack Cipher also has some security holes. The YGS Cipher is proposed to improve its security holes and makes it hard to break. In this thesis, we implement the YGS Cipher and propose the algorithms. We also discuss some notes during implementation.
Chu, Chen-Kuo, and 朱振國. "STUDY ON CIPHER FOR LOSSLESS CODING." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/9b5ez9.
Full text大同大學
電機工程學系(所)
95
The amount of digital information is increasing rapidly, so the compression techniques have become more important. The compression techniques may divide into two kinds, one is lossy scheme and the other is lossless one. Although the compression ratio of lossless system is less then lossy system, lossless system can recover original data. Furthermore, after lossless compression, it’s hard to recover, if did not know the algorithm and the parameter. In other words, that is one kind of encryption protection. We implement the lossless compression of cipher. The algorithm of lossless compression is prediction for first and then entropy coding. About prediction part, the finite impulse response predictor is used, about entropy coding, the Rice coding is used. The prediction take advantage of correlation between the adjacent data for removing the redundancy, it can decrease the quantity of data. The entropy coding is encoding smallest absolute value of prediction error, it also can decrease the quantity of data further. The encryption program transforms data with the algorithm of lossless compression. After delivers the destination, then uses reverse processing to recover data, such process can increase the security of data. In spite of data encryption is the attachment value of lossless compression, but it truly achieves goal of the protection.
Weinmann, Ralf-Philipp. "Algebraic Methods in Block Cipher Cryptanalysis." Phd thesis, 2009. http://tuprints.ulb.tu-darmstadt.de/1362/1/rpwphd.pdf.
Full textLI, BAO-SHENG, and 李保生. "A new cipher using addition operation." Thesis, 1992. http://ndltd.ncl.edu.tw/handle/49015714067615141676.
Full textChung, Chang-En, and 鍾長恩. "Time-Varying Embedded DES Cipher System." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/26890008629353393193.
Full text明志科技大學
電機工程研究所
101
With the gradually maturity of smart grid concepts and norms, the application of automatic meter reading technology and equipment are prevalent. Automatic meter reading technology is convenient and beneficial to reduce manpower, but the time stamp between the record center and watt-hour meter system time is probably asynchronous. The error of watt-hour meter record may be caused by the offset of the system timestamp. Additionally, the information transmitted from Watt-hour meter to record center may be stolen and falsified. To resolve these problems, the aim of this thesis is to develop an encryption system platform exemplified by Samsung S3C6410 ARM11, which encompassed the Linux embedded system with Qt as the core of the proposed system framework. Through the changes of the time factor consistent with Data Encryption Standard (DES) encryption method, the information of watt-hour meters has been protected. The method combined Encryption and decryption based on the precision time synchronization protocol (PTP) could meet the requirement of the system time synchronization. By the use of I/O pin trigger, Encryption and decryption can get the same encryption and decryption key at the same time. The encrypted watt-hour meter information can change with the trigger timing and time variation. The system included a touch trigger button, encryption, decryption information display, encryption and decryption status, which employed text file records for reference. The evidenced result revealed that the proposed system framework not only protect the security of watt-hour meter information, but also synchronize the time clock between the record center and watt-hour meter system time.
Hong, Jun-Chu, and 洪俊竹. "Parity Checks in Stream Cipher Correlation Attacks." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/70335756369848727570.
Full text國立交通大學
資訊工程系
88
The commonest stream cipher system uses a keystream generator which consists of several LFSRs combined by a combining function. If there exists a measure of correlation between the output sequence of the keystream generator and an arbitrary LFSR, the initial state of the LFSR can be reconstructed by a correlation attack, that is, the partial key in the LFSR is determined. W. Meier and O. Staffelbach proposed a correlation attack method using parity check equations. In this thesis, we discuss the algorithm and its constraints, and then propose some improvements: computing more low-weight parity check equations, accounting the precise number of relations of each digit, and solving the system of linear independent equations from digits instead of calculating the whole output sequence and the initial state of the LFSR from the relations among the digits.
Chiang, Pin-Yi, and 江品億. "An Implementation of the Dynamic Knapsack Cipher." Thesis, 1995. http://ndltd.ncl.edu.tw/handle/51838311572905112280.
Full text國立交通大學
資訊工程研究所
83
Primarily, the knapsack cipher was developed for public-key encryption. In Dynamic Knapsack Key Generation, however, a new symmetric-key system applying the knapsack key is proposed because of the practicality and flexibility. In this thesis, we implement the concept of this knapsack key generation and give the algorithms concerning encipherment and decipherment. Since the benefit of the variable number of the subkeys, we partition the plaintext to three parts to reduce the waste of the production of the subkeys for heading and trailing zeros. The problems, the key generation, the decision of private keys and data expansion, occurring during implementation are also considered. Furthermore, we discuss the possible trend of the improvement.
Shih, Shu-Ming, and 石書銘. "The study of Stream Cipher Grain Family." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/s32wpw.
Full text義守大學
資訊工程學系
105
A stream cipher family, Grain, is a lightweight stream cipher. It can designs in very limited hardware environments. That is one of the portfolio candidates in the hardware based category of eSTREAM. The main design concept is based on two shift registers and a non-linear output function, that also have the additional feature that the speed can be easily increased at the expense of extra hardware. In this paper, two versions of Grain and Grain-128 are discussed, and the randomness of the keystream is verified by NIST SP 800-22a random number test. Grain have weekness about exhaustive key search, and it could not passed all of the test, this also means that its randomness has doubts. Grain-128 through all tests, that its security is relatively high.
YANG, CHIEN-WEN, and 楊建文. "A Study on Public Key Stream Cipher." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/35814910942831451209.
Full text國立臺灣科技大學
電子工程系
88
Most stream cipher systems are based on symmetric cryptosystem. Very few Public-Key-Stream-Cipher systems, which are based on public-key algorithms have been proposed. We try to merge public key cryptosystem and stream cipher system together. And, in this thesis, we propose two types of Public-Key-Stream-Cipher systems: (1)Exponential computational encryption/decryption Public-Key- Stream-Cipher systems In this system, the encryption key stream is formed by the exponential computation of the public key of decrypter; the decryption key stream is formed by the exponential computation of the corresponding private key. (2)Easy computational encryption/decryption Public-Key-Stream- Cipher systems In this system, through key exchange process, encrypter can get session key by his private key and the public key of decrypter; also, decrypter can get the same session key by his private key and the public key of encrypter. Both sides use the same session key going through the same key stream generator and hash function, and then get the same encryption/decryption key stream at an appropriate length to encrypt/decrypt message.
Yu, Tzung-Jeng, and 余宗振. "An Improvement of Self-Synchronization Stream Cipher." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/27108643884231920653.
Full text長庚大學
電子工程研究所
96
In this paper, we propose a low error propagation statistical self-synchronization cipher feedback (LEPSCFB) mode for stream ciphers. The LEPSCFB is proposed in order to improve the security and make the error propagation less than the statistical self-synchronization cipher feedback (SCFB) mode. The operation of SCFB mode involves the operations of a output feedback (OFB) mode and a cipher feedback (CFB) mode. Unlike the SCFB, the operation of LEPSCFB mode involves that of a counter (CTR) mode and a cipher feedback (CFB) mode. Note that the system complexity of the LEPSCFB mode is comparable with the SCFB mode and the fundamental requirement of self-synchronization still be held. Furthermore, LEPSCFB has some advantages compared with SCFB mode. Specifically, this paper presents a provably secure LEPSCFB based on the scheme. Besides, the advantage of LEPSCFB is that error propagation is less than SCFB based on statistical analysis.