Academic literature on the topic 'Keystream'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Keystream.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Keystream"

1

Alekseychuk, A. M., and I. V. Samoylov. "Probabilistic properties of solutions to the equation system of keystream generators with irregular motion." Radiotekhnika, no. 218 (September 26, 2024): 93–102. https://doi.org/10.30837/rt.2024.3.218.07.

Full text
Abstract:
The traditional basis for constructing modern stream ciphers is keystream generators, which are based on linear shift registers and nonlinear complexity elements. One of the well-known methods for increasing the resistance of such generators, in particular, against algebraic and correlation attacks, is using irregularity into register’s motion process. The most popular keystream generators with irregular motion, used in stream ciphers are A5/1, Alpha1, LILI-128 and others, were thoroughly studied in the 1990s and 2000s. However, specialists’ interest remains relevant, it’s evidenced by recent
APA, Harvard, Vancouver, ISO, and other styles
2

Fu, Chong, Gao-yuan Zhang, Mai Zhu, Zhe Chen, and Wei-min Lei. "A New Chaos-Based Color Image Encryption Scheme with an Efficient Substitution Keystream Generation Strategy." Security and Communication Networks 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/2708532.

Full text
Abstract:
This paper suggests a new chaos-based color image cipher with an efficient substitution keystream generation strategy. The hyperchaotic Lü system and logistic map are employed to generate the permutation and substitution keystream sequences for image data scrambling and mixing. In the permutation stage, the positions of colored subpixels in the input image are scrambled using a pixel-swapping mechanism, which avoids two main problems encountered when using the discretized version of area-preserving chaotic maps. In the substitution stage, we introduce an efficient keystream generation method t
APA, Harvard, Vancouver, ISO, and other styles
3

Shyi-Tsong Wu, Shyi-Tsong Wu. "An Application of Keystream Using Cellular Automata for Image Encryption in IoT." 網際網路技術學刊 24, no. 1 (2023): 149–62. http://dx.doi.org/10.53106/160792642023012401014.

Full text
Abstract:
<p>Recently, there have been some studies on security applications using cellular automata. A cellular automaton (CA) is characterized by simplicity and high-speed computation, making it suitable for the resource-constrained IoT environment. In this paper, we first merge a sliding-window, bit permutation, and a CA and propose a keystream generator that has the inherent CA advantages of simplicity and speed. The sliding-window provides the unpredictability of the keystream and gains strength in terms of security. The produced keystream has passed the tests of NIST SP800-22. On the basis o
APA, Harvard, Vancouver, ISO, and other styles
4

Yerukala, Nagendar, V. Kamakshi Prasad, and Allam Apparao. "Performance and Statistical Analysis of Stream ciphers in GSM Communications." Journal of communications software and systems 16, no. 1 (2020): 11–18. http://dx.doi.org/10.24138/jcomss.v16i1.892.

Full text
Abstract:
For a stream cipher to be secure, the keystream generated by it should be uniformly random with parameter 1/2.Statistical tests check whether the given sequence follow a certain probability distribution. In this paper, we perform a detailed statistical analysis of various stream ciphers used in GSM 2G,3G, 4G and 5G communications. The sequences output by these ciphers are checked for randomness using the statistical tests defined by the NIST Test Suite. It should also be not possible to derive any information about secret key and the initial state ofthe cipher from the keystream. Therefore, ad
APA, Harvard, Vancouver, ISO, and other styles
5

Chan, Chi-Kwong, and L. M. Cheng. "Design of keystream generator." Electronics Letters 34, no. 12 (1998): 1206. http://dx.doi.org/10.1049/el:19980824.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dafik, Swaminathan Venkatraman, G. Sathyanarayanan, Rifki Ilham Baihaki, Indah Lutfiyatul Mursyidah, and Ika Hesti Agustin. "Enhancing Text Encryption and Secret Document Watermarking through Hyperladder Graph-Based Keystream Construction on Asymmetric Cryptography Technology." Statistics, Optimization & Information Computing 14, no. 1 (2025): 247–63. https://doi.org/10.19139/soic-2310-5070-2310.

Full text
Abstract:
Message security remains a vital concern in cryptography. This paper introduces a novel enhancement to the classical Caesar cipher by generating a keystream from a Hyper-Ladder Graph, which combines hypergraph and ladder graph properties to produce complex and unpredictable patterns. The proposed method is evaluated against AES, DES, ChaCha20, and XChaCha20, showing superior performance in encryption time and memory efficiency, especially in constrained environments. To demonstrate broader applicability, we implemented the keystream in grayscale image watermarking. The binary keystream was fir
APA, Harvard, Vancouver, ISO, and other styles
7

Savova, Zhaneta N., Antoniya T. Tasheva, and Rosen A. Bogdanov. "Method for the Simultaneous Generation of Two Nonlinear Pseudo Random Sequences: 5-ary and Binary." WSEAS TRANSACTIONS ON ELECTRONICS 14 (December 31, 2023): 71–78. http://dx.doi.org/10.37394/232017.2023.14.9.

Full text
Abstract:
Multi-level signals and sequences have become a significant aspect of modern high-speed communication systems. Hence, to ensure the confidentiality and integrity of the transmitted information, advanced methods and devices are necessary to produce strong cryptographic properties for not only binary but also for nonbinary keystreams, which can be used in resource-constrained microcontrollers. The proposed method and apparatus generate both a balanced nonlinear 5-ary pseudo-random sequence and a binary keystream sequence. The nonlinearity is determined by applying shrinking and multiplexing tech
APA, Harvard, Vancouver, ISO, and other styles
8

KANSO, ALI, and NEJIB SMAOUI. "IRREGULARLY DECIMATED CHAOTIC MAP(S) FOR BINARY DIGITS GENERATIONS." International Journal of Bifurcation and Chaos 19, no. 04 (2009): 1169–83. http://dx.doi.org/10.1142/s0218127409023573.

Full text
Abstract:
This paper proposes a new technique for generating random-looking binary digits based on an irregularly decimated chaotic map. We present a class of irregularly decimated chaos-based keystream generators, related to the shrinking generator, for the generation of binary sequences. Each generator consists of two subsystems: a control subsystem and a generating subsystem, where each subsystem is based on a single chaotic map. This chaotic map is presented as a 1-D piecewise chaotic map related to the chaotic logistic map. We conduct an analysis of the dynamical behavior of the proposed map to int
APA, Harvard, Vancouver, ISO, and other styles
9

Sang, Tao, Ruli Wang, and Yixun Yan. "Clock-controlled chaotic keystream generators." Electronics Letters 34, no. 20 (1998): 1932. http://dx.doi.org/10.1049/el:19981377.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Golic, J. D. "Linear models for keystream generators." IEEE Transactions on Computers 45, no. 1 (1996): 41–49. http://dx.doi.org/10.1109/12.481485.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Keystream"

1

Beighton, Matthew. "Security analysis of shift-register based keystream generators for stream ciphers." Thesis, Queensland University of Technology, 2022. https://eprints.qut.edu.au/236239/1/Matthew%2BBeighton%2BThesis%282%29.pdf.

Full text
Abstract:
Society's thirst for smaller, faster and more complex technology requires highly secure cryptosystems. These systems are under constant pressure to evolve higher levels of security integrated within ever-shrinking, highly complex hardware, with minimal runtime costs. These demands have focused attention on the design of lightweight cryptographic algorithms because of their speed. The research presented in this thesis focuses on the design and security analysis of lightweight stream ciphers capable of authenticated encryption with associated data (AEAD), proposed as part of the National Institu
APA, Harvard, Vancouver, ISO, and other styles
2

Chuah, Chai Wen. "Key derivation function based on stream ciphers." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/71025/1/Chai%20Wen_Chuah_Thesis.pdf.

Full text
Abstract:
A key derivation function (KDF) is a function that transforms secret non-uniformly random source material together with some public strings into one or more cryptographic keys. These cryptographic keys are used with a cryptographic algorithm for protecting electronic data during both transmission over insecure channels and storage. In this thesis, we propose a new method for constructing a generic stream cipher based key derivation function. We show that our proposed key derivation function based on stream ciphers is secure if the under-lying stream cipher is secure. We simulate instances of t
APA, Harvard, Vancouver, ISO, and other styles
3

Alhamdan, Ali Abdulaziz. "Secure stream cipher initialisation processes." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/66721/1/Ali%20Abdulaziz%20H_Al%20Hamdan_Thesis.pdf.

Full text
Abstract:
Stream ciphers are symmetric key cryptosystems that are used commonly to provide confidentiality for a wide range of applications; such as mobile phone, pay TV and Internet data transmissions. This research examines the features and properties of the initialisation processes of existing stream ciphers to identify flaws and weaknesses, then presents recommendations to improve the security of future cipher designs. This research investigates well-known stream ciphers: A5/1, Sfinks and the Common Scrambling Algorithm Stream Cipher (CSA-SC). This research focused on the security of the initiali
APA, Harvard, Vancouver, ISO, and other styles
4

Teo, Sui-Guan. "Analysis of nonlinear sequences and streamciphers." Thesis, Queensland University of Technology, 2013. https://eprints.qut.edu.au/63358/1/Sui-Guan_Teo_Thesis.pdf.

Full text
Abstract:
Streamciphers are common cryptographic algorithms used to protect the confidentiality of frame-based communications like mobile phone conversations and Internet traffic. Streamciphers are ideal cryptographic algorithms to encrypt these types of traffic as they have the potential to encrypt them quickly and securely, and have low error propagation. The main objective of this thesis is to determine whether structural features of keystream generators affect the security provided by stream ciphers.These structural features pertain to the state-update and output functions used in keystream gener
APA, Harvard, Vancouver, ISO, and other styles
5

Penna, Lyta. "Implementation issues in symmetric ciphers." Thesis, Queensland University of Technology, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Simpson, Leonie Ruth. "Divide and conquer attacks on shift register based stream ciphers." Thesis, Queensland University of Technology, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Du, Yu-Jing, and 杜雨靜. "FCSR Based Hybrid Keystream Generator." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/78538335864179093009.

Full text
Abstract:
碩士<br>國立宜蘭大學<br>電子工程學系碩士班<br>99<br>Linear Feedback Shift Register (LFSR) is the basic structure of stream cipher, and Feedback with Carry Shift Register (FCSR) is the nonlinear analogues of LFSR. FCSR is a new feedback architecture to generate long pseudorandom sequence. In this thesis, we study the characteristics of FCSR based nonlinear circuits such as Dawson’s Summation Generator (DSG), lp-Geffe generator and etc. Then we apply FCSR based DSG and lp-Geffe generator as nonlinear combining elements to increase the period and the linear complexity of the output sequence. In addition, we furth
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Chun-Chen, and 劉峻辰. "The Keystream Generator Based on Hybrid Chaos." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/75995379359030002897.

Full text
Abstract:
碩士<br>國立宜蘭大學<br>電子工程學系碩士班<br>103<br>In recent years, chaotic theorem has been applied in cryptography, and many stream ciphers based on chaos were proposed. In this thesis, we propose the new hybrid keystream generators based on chaos. We use the one-dimensional chaotic maps to reduce the operation load. In addition, to increase the randomness and the linear complexity of output sequence, we merge different one-dimensional chaotic system to build the structure of the hybrid keystream generators. First we apply the linear Exclusive OR as the combining element. Besides, we exploit the Dawson’s S
APA, Harvard, Vancouver, ISO, and other styles
9

Shepherd, Simon J., and Jorge C. Mex-Pereira. "Cryptanalysis of a summation generator with 2 bits of memory." 2002. http://hdl.handle.net/10454/3744.

Full text
Abstract:
No<br>The conventional summation generator (SG) has been broken in the past using a number of different methods. Recently, a modified SG was proposed by Lee and Moon to increase the resistance of such generators against these attacks. However, this paper shows that even the modified generator is still vulnerable to correlation attacks.
APA, Harvard, Vancouver, ISO, and other styles
10

Cheng, Tsung-Yuan, and 鄭琮元. "Enhanced Wireless IEEE 802.11b Protocols Resistant to the Keystream Reuse Attack and Known IV Attack." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/37853115115111108080.

Full text
Abstract:
碩士<br>國立東華大學<br>資訊工程學系<br>91<br>The security mechanisms of IEEE 802.11b wireless network standard are Wired Equivalent Privacy (WEP) protocol and Extended Service Set Identifier (ESSID). The WEP uses the stream cipher RC4 to protect communication from eavesdropping. ESSID is used for access control. Both of them assure the privacy of IEEE 802.11b.However, in WEP protocol, using RC4 stream cipher has security flaws. The WEP protocol is vulnerable to two effective attacks. One is the keystream reuse attack that aims at public initialization vector (IV) and fixed secret key in WEP header. Since p
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Keystream"

1

Leader, Jeffery J. Neural network identification of keystream generators. Naval Postgraduate School, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Leader, Jeffery J. Chaotic keystream generators for additive stream ciphers. Naval Postgraduate School, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cardell, Sara Díaz, and Amparo Fúster-Sabater. Cryptography with Shrinking Generators: Fundamentals and Applications of Keystream Sequence Generators Based on Irregular Decimation. Springer, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Keystream"

1

Ruth Simpson, Leonie, E. Dawson, Jovan Dj Golić, and William L. Millan. "LILI Keystream Generator." In Selected Areas in Cryptography. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44983-3_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Anderson, Ross. "On Fibonacci keystream generators." In Fast Software Encryption. Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/3-540-60590-8_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Clark, A., Ed Dawson, J. Fuller, et al. "The LILI-II Keystream Generator." In Information Security and Privacy. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45450-0_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Watanabe, Dai, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, and Bart Preneel. "A New Keystream Generator MUGI." In Fast Software Encryption. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45661-9_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Minaud, Brice. "Linear Biases in AEGIS Keystream." In Selected Areas in Cryptography -- SAC 2014. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13051-4_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Krause, Matthias. "BDD-Based Cryptanalysis of Keystream Generators." In Advances in Cryptology — EUROCRYPT 2002. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-46035-7_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Golić, Jovan Dj. "Intrinsic statistical weakness of keystream generators." In Advances in Cryptology — ASIACRYPT'94. Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/bfb0000427.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cardell, Sara Díaz, and Amparo Fúster-Sabater. "Keystream Generators Based on Irregular Decimation." In SpringerBriefs in Mathematics. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12850-0_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Golić, Jovan D. "Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator." In Information Security and Privacy. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10718964_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Nikolov, Nikolai, and Nikolai Stoianov. "A Novel Keystream Generator with Cryptographic Purpose." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30721-8_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Keystream"

1

Gorbenko, Ivan, Olexandr Kuznetsov, Yuriy Gorbenko, Anton Alekseychuk, and Vlad Tymchenko. "Strumok keystream generator." In 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT). IEEE, 2018. http://dx.doi.org/10.1109/dessert.2018.8409147.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Harmouch, Youssef, and Rachid El Kouch. "A chaotic keystream generation for stream cipher." In the International Conference. ACM Press, 2018. http://dx.doi.org/10.1145/3230905.3230942.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tounsi, Wiem, Benjamin Justus, Nora Cuppens Boulahia, Frederic Cuppen, and Joaquin Garcia Alfaro. "Probabilistic Cycle Detection for Schneier's Solitaire Keystream Algorithm." In 2014 IEEE 8th International Conference on Software Security and Reliability-Companion (SSIRI-C). IEEE, 2014. http://dx.doi.org/10.1109/sere-c.2014.29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yingsong, Wang, and Chen Wei. "f8 Keystream Generator with SMS4 as Core Algorithm." In 2009 Fifth International Conference on Information Assurance and Security. IEEE, 2009. http://dx.doi.org/10.1109/ias.2009.290.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dong, Lihua, Yong Zeng, and Yupu Hu. "F-GSS: A Novel FCSR-Based Keystream Generator." In 2009 1st International Conference on Information Science and Engineering (ICISE 2009). IEEE, 2009. http://dx.doi.org/10.1109/icise.2009.578.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

AbdElHaleem, Sherif H., Ahmed G. Radwan, and Salwa K. Abd-El-Hafiz. "Design of pseudo random keystream generator using fractals." In 2013 IEEE 20th International Conference on Electronics, Circuits, and Systems (ICECS). IEEE, 2013. http://dx.doi.org/10.1109/icecs.2013.6815554.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Belmeguenai, Aissa, Oulaya Berrak, and Khaled Mansouri. "Image Encryption using Improved Keystream Generator of Achterbahn-128." In International Conference on Computer Vision Theory and Applications. SCITEPRESS - Science and Technology Publications, 2016. http://dx.doi.org/10.5220/0005713503330339.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kharel, Rupak, K. Busawon, and Z. Ghassemlooy. "Indirect coupled oscillators for keystream generation in secure chaotic communication." In 2009 Joint 48th IEEE Conference on Decision and Control (CDC) and 28th Chinese Control Conference (CCC). IEEE, 2009. http://dx.doi.org/10.1109/cdc.2009.5400056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kumar, P., M. I. Salam, A. G. Reza, Hyo Taek Lim, and Hoon Jae Lee. "Performance analysis of PingPong-128 keystream generator for wireless sensor networks." In 2010 5th International Conference on Computer Sciences and Convergence Information Technology (ICCIT 2010). IEEE, 2010. http://dx.doi.org/10.1109/iccit.2010.5711136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Juanjuan, and Yunqing Xu. "Stream Cipher Based on Quasigroups with Keystream Period of Arbitrary Length." In 2012 International Conference on Computer Science and Service System (CSSS). IEEE, 2012. http://dx.doi.org/10.1109/csss.2012.213.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Keystream"

1

Leader, Jeffery J., and James E. Heyman. Neural Network Identification of Keystream Generators. Defense Technical Information Center, 1993. http://dx.doi.org/10.21236/ada265778.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Leader, Jeffrey J. Chaotic Keystream Generators for Additive Stream Ciphers. Defense Technical Information Center, 1993. http://dx.doi.org/10.21236/ada265824.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!