To see the other types of publications on this topic, follow the link: Keystream.

Journal articles on the topic 'Keystream'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Keystream.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Alekseychuk, A. M., and I. V. Samoylov. "Probabilistic properties of solutions to the equation system of keystream generators with irregular motion." Radiotekhnika, no. 218 (September 26, 2024): 93–102. https://doi.org/10.30837/rt.2024.3.218.07.

Full text
Abstract:
The traditional basis for constructing modern stream ciphers is keystream generators, which are based on linear shift registers and nonlinear complexity elements. One of the well-known methods for increasing the resistance of such generators, in particular, against algebraic and correlation attacks, is using irregularity into register’s motion process. The most popular keystream generators with irregular motion, used in stream ciphers are A5/1, Alpha1, LILI-128 and others, were thoroughly studied in the 1990s and 2000s. However, specialists’ interest remains relevant, it’s evidenced by recent
APA, Harvard, Vancouver, ISO, and other styles
2

Fu, Chong, Gao-yuan Zhang, Mai Zhu, Zhe Chen, and Wei-min Lei. "A New Chaos-Based Color Image Encryption Scheme with an Efficient Substitution Keystream Generation Strategy." Security and Communication Networks 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/2708532.

Full text
Abstract:
This paper suggests a new chaos-based color image cipher with an efficient substitution keystream generation strategy. The hyperchaotic Lü system and logistic map are employed to generate the permutation and substitution keystream sequences for image data scrambling and mixing. In the permutation stage, the positions of colored subpixels in the input image are scrambled using a pixel-swapping mechanism, which avoids two main problems encountered when using the discretized version of area-preserving chaotic maps. In the substitution stage, we introduce an efficient keystream generation method t
APA, Harvard, Vancouver, ISO, and other styles
3

Shyi-Tsong Wu, Shyi-Tsong Wu. "An Application of Keystream Using Cellular Automata for Image Encryption in IoT." 網際網路技術學刊 24, no. 1 (2023): 149–62. http://dx.doi.org/10.53106/160792642023012401014.

Full text
Abstract:
<p>Recently, there have been some studies on security applications using cellular automata. A cellular automaton (CA) is characterized by simplicity and high-speed computation, making it suitable for the resource-constrained IoT environment. In this paper, we first merge a sliding-window, bit permutation, and a CA and propose a keystream generator that has the inherent CA advantages of simplicity and speed. The sliding-window provides the unpredictability of the keystream and gains strength in terms of security. The produced keystream has passed the tests of NIST SP800-22. On the basis o
APA, Harvard, Vancouver, ISO, and other styles
4

Yerukala, Nagendar, V. Kamakshi Prasad, and Allam Apparao. "Performance and Statistical Analysis of Stream ciphers in GSM Communications." Journal of communications software and systems 16, no. 1 (2020): 11–18. http://dx.doi.org/10.24138/jcomss.v16i1.892.

Full text
Abstract:
For a stream cipher to be secure, the keystream generated by it should be uniformly random with parameter 1/2.Statistical tests check whether the given sequence follow a certain probability distribution. In this paper, we perform a detailed statistical analysis of various stream ciphers used in GSM 2G,3G, 4G and 5G communications. The sequences output by these ciphers are checked for randomness using the statistical tests defined by the NIST Test Suite. It should also be not possible to derive any information about secret key and the initial state ofthe cipher from the keystream. Therefore, ad
APA, Harvard, Vancouver, ISO, and other styles
5

Chan, Chi-Kwong, and L. M. Cheng. "Design of keystream generator." Electronics Letters 34, no. 12 (1998): 1206. http://dx.doi.org/10.1049/el:19980824.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dafik, Swaminathan Venkatraman, G. Sathyanarayanan, Rifki Ilham Baihaki, Indah Lutfiyatul Mursyidah, and Ika Hesti Agustin. "Enhancing Text Encryption and Secret Document Watermarking through Hyperladder Graph-Based Keystream Construction on Asymmetric Cryptography Technology." Statistics, Optimization & Information Computing 14, no. 1 (2025): 247–63. https://doi.org/10.19139/soic-2310-5070-2310.

Full text
Abstract:
Message security remains a vital concern in cryptography. This paper introduces a novel enhancement to the classical Caesar cipher by generating a keystream from a Hyper-Ladder Graph, which combines hypergraph and ladder graph properties to produce complex and unpredictable patterns. The proposed method is evaluated against AES, DES, ChaCha20, and XChaCha20, showing superior performance in encryption time and memory efficiency, especially in constrained environments. To demonstrate broader applicability, we implemented the keystream in grayscale image watermarking. The binary keystream was fir
APA, Harvard, Vancouver, ISO, and other styles
7

Savova, Zhaneta N., Antoniya T. Tasheva, and Rosen A. Bogdanov. "Method for the Simultaneous Generation of Two Nonlinear Pseudo Random Sequences: 5-ary and Binary." WSEAS TRANSACTIONS ON ELECTRONICS 14 (December 31, 2023): 71–78. http://dx.doi.org/10.37394/232017.2023.14.9.

Full text
Abstract:
Multi-level signals and sequences have become a significant aspect of modern high-speed communication systems. Hence, to ensure the confidentiality and integrity of the transmitted information, advanced methods and devices are necessary to produce strong cryptographic properties for not only binary but also for nonbinary keystreams, which can be used in resource-constrained microcontrollers. The proposed method and apparatus generate both a balanced nonlinear 5-ary pseudo-random sequence and a binary keystream sequence. The nonlinearity is determined by applying shrinking and multiplexing tech
APA, Harvard, Vancouver, ISO, and other styles
8

KANSO, ALI, and NEJIB SMAOUI. "IRREGULARLY DECIMATED CHAOTIC MAP(S) FOR BINARY DIGITS GENERATIONS." International Journal of Bifurcation and Chaos 19, no. 04 (2009): 1169–83. http://dx.doi.org/10.1142/s0218127409023573.

Full text
Abstract:
This paper proposes a new technique for generating random-looking binary digits based on an irregularly decimated chaotic map. We present a class of irregularly decimated chaos-based keystream generators, related to the shrinking generator, for the generation of binary sequences. Each generator consists of two subsystems: a control subsystem and a generating subsystem, where each subsystem is based on a single chaotic map. This chaotic map is presented as a 1-D piecewise chaotic map related to the chaotic logistic map. We conduct an analysis of the dynamical behavior of the proposed map to int
APA, Harvard, Vancouver, ISO, and other styles
9

Sang, Tao, Ruli Wang, and Yixun Yan. "Clock-controlled chaotic keystream generators." Electronics Letters 34, no. 20 (1998): 1932. http://dx.doi.org/10.1049/el:19981377.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Golic, J. D. "Linear models for keystream generators." IEEE Transactions on Computers 45, no. 1 (1996): 41–49. http://dx.doi.org/10.1109/12.481485.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

KANSO, ALI. "SEARCH-BASED CHAOTIC PSEUDORANDOM BIT GENERATOR." International Journal of Bifurcation and Chaos 19, no. 12 (2009): 4227–35. http://dx.doi.org/10.1142/s0218127409025316.

Full text
Abstract:
This paper proposes the construction of a new chaotic pseudorandom bit generator, which forms the main building block of a chaotic stream cipher. The design of the algorithm is based on a single chaotic map whose numerical orbit indirectly contributes towards the generation of the keystream. The latter is produced from the numerical orbit by applying a technique that searches for iterates in specific intervals [a,b], for some real numbers a and b, and outputs 0 or 1 based on the iterate preceding the targeted iterate. The generator suggested here is built up from a quadratic map. We analyze th
APA, Harvard, Vancouver, ISO, and other styles
12

Jain, Ashish, Inderjeet Kaur, Akhilesh Kumar Sharma, Nirmal Kumar Gupta, and Partha Chakraborty. "A New Guess-and-Determine Method for Cryptanalysis of the GSM Encryption." Complexity 2023 (February 18, 2023): 1–9. http://dx.doi.org/10.1155/2023/7249127.

Full text
Abstract:
Cryptanalysis is the process of finding flaws or oversights in an encryption algorithm. Nearly, all encryption algorithms are carefully examined through cryptanalysis to determine the security of the system in which the encryption algorithm has been employed. A5/1 is a well-known encryption algorithm which is inbuilt in mobile phone for securing GSM communication, and therefore, cryptanalysis of this algorithm is also important. A5/1 consists of three linear feedback registers of lengths 23, 22, and 19 bits. Due to the nonlinear clocking mechanism of A5/1, cryptanalytic attacks of guess-and-de
APA, Harvard, Vancouver, ISO, and other styles
13

Hromada, Viliam, and Juraj Varga. "Phase-shift fault analysis of Trivium." Studia Scientiarum Mathematicarum Hungarica 52, no. 2 (2015): 205–20. http://dx.doi.org/10.1556/012.2015.52.2.1308.

Full text
Abstract:
This paper deals with the phase-shift fault analysis of cipher Trivium. So far, only bit-flipping technique has been presented in the literature. The best fault attack on Trivium [13] combines bit-flipping with algebraic cryptanalysis and needs to induce 2 one-bit faults and to generate 420 bits per each keystream. Our attack combines phase-shifting and algebraic cryptanalysis and needs to phase-shift 2 registers of the cipher and to generate 120 bits per each keystream.
APA, Harvard, Vancouver, ISO, and other styles
14

SouzaBanegas, Gustavo, and Ricardo Felipe Custodio. "An Efficient Keystream for Cryptographic Applications." International Journal of Computer Applications 109, no. 2 (2015): 1–5. http://dx.doi.org/10.5120/19157-0610.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Chambers, W. G., and S. J. Shepherd. "Mutually clock-controlled cipher keystream generators." Electronics Letters 33, no. 12 (1997): 1020. http://dx.doi.org/10.1049/el:19970728.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Suwais, Khaled, and Sally Almanasra. "Strike: Stream Cipher Based on Stochastic Lightning Strike Behaviour." Applied Sciences 13, no. 8 (2023): 4669. http://dx.doi.org/10.3390/app13084669.

Full text
Abstract:
There is an increasing need for secure and fast encryption algorithms to support applications and communication protocols, and business models. In this paper, we present an alternative stream cipher (Strike) inspired by the stochastic behaviour of lightning strike phenomena. The novelty and originality of Strike stem from the utilisation of lightning strike behaviour as a source for generating random keystreams for encryption and decryption. Strike consists of three main functions: a function for setting up the security attributes, a function for generating lightning strikes and converting the
APA, Harvard, Vancouver, ISO, and other styles
17

Kuznetsov, O. O., I. D. Gorbenko, Y. I. Gorbenko, A. M. Alekseychuk, and V. A. Tymchenko. "Mathematical structure of the Strumok stream cipher." Radiotekhnika, no. 193 (May 15, 2018): 17–27. http://dx.doi.org/10.30837/rt.2018.2.193.02.

Full text
Abstract:
The main development results of a new keystream generator, named “Strumok”, and offered as a candidate for the national symmetric encryption standard of Ukraine, are presented. Strumok is built according to the SNOW2.0-like schema of the summation generator; increased secret key length and the initialization vector allow using reliably the stream cipher even taking into account quantum cryptographic analysis methods. The basic transformations and individual results from the cipher performance research are given, moreover, here it is shown the generator, capable of forming a keystream at speed
APA, Harvard, Vancouver, ISO, and other styles
18

Nisviasari, R., Dafik, I. H. Agustin, E. Y. Kurniawati, I. N. Maylisa, and B. J. Septory. "Improving the robustness of the affine cipher by using a rainbow antimagic coloring." Journal of Physics: Conference Series 2157, no. 1 (2022): 012017. http://dx.doi.org/10.1088/1742-6596/2157/1/012017.

Full text
Abstract:
Abstract Nowadays, cryptosystems can be applied in several areas in life. One of them is in transaction data. In transaction data, a very strong cryptosystem is needed so that the transaction data is safe. Cryptosystems are better with a strong keystream. In this case, we use rainbow antimagic as a cryptosystem key to improve the robustness of the keystream by using affine cipher. The algorithm uses the edge weights of rainbow antimagic vertex labeling of graphs as a key for encryption and decryption. In this paper, we found the rainbow antimagic connection number of tadpole graphs and two alg
APA, Harvard, Vancouver, ISO, and other styles
19

Gu, Guo Sheng, Jie Ling, Guo Bo Xie, and Yu Yi Ou. "A Chaotic Image Encryption Algorithm Based on a Dynamical Feedback Operation." Advanced Materials Research 989-994 (July 2014): 3561–66. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.3561.

Full text
Abstract:
This paper designs an image encryption algorithm with a dynamical feedback operation based on sensitive chaotic system. In the proposed algorithm, the piece wise linear chaotic map is selected to construct pseudo-random keystream sequences. The pseudorandom keystream sequences are used to permute and substitute the plain image data. To enhance the complexity and security of the algorithm, each pixel is dynamically confused by its two previous adjacent encrypted pixels which are specified by a quantized binary tuple derived from a chaotic element. Both theoretical analysis and experimental test
APA, Harvard, Vancouver, ISO, and other styles
20

Álvarez, G., F. Montoya, M. Romera, and G. Pastor. "Keystream cryptanalysis of a chaotic cryptographic method." Computer Physics Communications 156, no. 2 (2004): 205–7. http://dx.doi.org/10.1016/s0010-4655(03)00432-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Menicocci, R. "Intrinsic weakness of variable-memory keystream generators." Electronics Letters 30, no. 11 (1994): 850. http://dx.doi.org/10.1049/el:19940573.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Krause, Matthias. "OBDD-Based Cryptanalysis of Oblivious Keystream Generators." Theory of Computing Systems 40, no. 1 (2005): 101–21. http://dx.doi.org/10.1007/s00224-005-1282-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Klapper, Andrew. "On the Existence of Secure Keystream Generators." Journal of Cryptology 14, no. 1 (2001): 1–15. http://dx.doi.org/10.1007/s001450010014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Huang, Yongzhong, Xueguang Bi, Yucheng Liu, and Yuxia Li. "Development of a Novel Hyperchaos-Based Image Encryption Algorithm Consisting of Two Scrambling-Diffusion Operations." Complexity 2022 (October 4, 2022): 1–15. http://dx.doi.org/10.1155/2022/8765268.

Full text
Abstract:
This paper proposes a hyperchaos-based image encryption algorithm, which consists of two scrambling-diffusion operations and one scrambling operation. In the proposed algorithm, the initial conditions of a hyperchaotic Chen system are first generated using the Message Digest 5 (MD5) value of digital images and given initial values, and then the images will be encrypted using the keystream created by the system. Since the initial values of hyperchaotic Chen systems are related to plaintext and the encryption process is related to the images, this algorithm is able to effectively protect images
APA, Harvard, Vancouver, ISO, and other styles
25

ISOBE, Takanori, Toshihiro OHIGASHI, Yuhei WATANABE, and Masakatu MORII. "Comprehensive Analysis of Initial Keystream Biases of RC4." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E97.A, no. 1 (2014): 139–51. http://dx.doi.org/10.1587/transfun.e97.a.139.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

T, Jan Carlo. "A Keystream-Based Affine Cipher for Dynamic Encryption." International Journal of Emerging Trends in Engineering Research 8, no. 7 (2020): 2919–22. http://dx.doi.org/10.30534/ijeter/2020/06872020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Parker, A. T., and K. M. Short. "Reconstructing the keystream from a chaotic encryption scheme." IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications 48, no. 5 (2001): 624–30. http://dx.doi.org/10.1109/81.922466.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Fuster-Sabater, A., and P. Caballero-Gil. "Global linear complexity analysis of filter keystream generators." IEE Proceedings - Computers and Digital Techniques 144, no. 1 (1997): 33. http://dx.doi.org/10.1049/ip-cdt:19970764.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Kimberley, M. "Comparison of two statistical tests for keystream sequences." Electronics Letters 23, no. 8 (1987): 365. http://dx.doi.org/10.1049/el:19870268.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Zhi-ping, Wu, Ye Ding-feng, and Ma Wei-ju. "Algebraic attack on Filter-Combiner model keystream generators." Wuhan University Journal of Natural Sciences 10, no. 1 (2005): 259–62. http://dx.doi.org/10.1007/bf02828664.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Mahdi, Mohammed, and Nidaa Hassan. "A SUGGESTED SUPER SALSA STREAM CIPHER." Iraqi Journal for Computers and Informatics 44, no. 2 (2018): 5–10. http://dx.doi.org/10.25195/ijci.v44i2.51.

Full text
Abstract:
Salsa (20) cipher is speedier than AES cipher and its offered superior security. Salsa (8) and Salsa (12) are specifiedfor apps wherever the grade of security is less necessary than speed. The concept of this research is to suggest super salsakeystream utilizing various volumes matrices size (array (4, 4), array (4, 8), array (4, 16)) are used to increase the complexity ofkey stream and make it more reluctant to linear and differential attacks. Furthermore, in each iteration, the diffusion ofgenerated keystream will increase due the effect of changing the volume acting for one element of the a
APA, Harvard, Vancouver, ISO, and other styles
32

Ahmad, Musheer. "Chaos Based Mixed Keystream Generation for Voice Data Encryption." International Journal on Cryptography and Information Security 2, no. 1 (2012): 39–48. http://dx.doi.org/10.5121/ijcis.2012.2104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Salam, Md Iftekhar, and Hoon Jae Lee. "On the algebraic attack against summation type keystream generators." International Journal of Information and Computer Security 5, no. 2 (2012): 132. http://dx.doi.org/10.1504/ijics.2012.051778.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

García-Villalba, L. J., and M. C. Rodríguez-Palánquex. "A family of keystream generators with large linear complexity." Applied Mathematics Letters 14, no. 5 (2001): 545–47. http://dx.doi.org/10.1016/s0893-9659(00)00191-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Blackburn, S. R. "Cryptanalysis of keystream generator due to Chan and Cheng." Electronics Letters 34, no. 18 (1998): 1737. http://dx.doi.org/10.1049/el:19981226.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Sang, Tao, Ruli Wang, and Yixun Yan. "Chaos-based feedforward output functions for combining keystream generators." Journal of Electronics (China) 18, no. 4 (2001): 314–20. http://dx.doi.org/10.1007/s11767-001-0045-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Wu, Shyi-Tsong. "Hybrid Chaotic Keystream Generator Based on Dawson’s Summation Generator." Sensors and Materials 35, no. 5 (2023): 1687. http://dx.doi.org/10.18494/sam4316.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Gül, Çaǧdaş, and Orhun Kara. "Correction to “A New Construction Method for Keystream Generators”." IEEE Transactions on Information Forensics and Security 19 (2024): 4198. http://dx.doi.org/10.1109/tifs.2024.3372200.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

KANSO, ALI. "CIPHER SYSTEMS BASED ON CONTROLLED EXACT CHAOTIC MAPS." International Journal of Bifurcation and Chaos 20, no. 12 (2010): 4039–53. http://dx.doi.org/10.1142/s0218127410028173.

Full text
Abstract:
In this paper, we present a class of chaotic clock-controlled cipher systems based on two exact chaotic maps, where each map is capable of generating exact chaotic time series of the logistic map. This class is designed in such a way that one map controls the iterations of the second map. The suggested technique results in generating orbits possessing long cycle length and high level of security from the two periodic exact maps. In the first part of this paper, two keystream generators based on two exact chaotic logistic maps are suggested for use in cryptographic applications. The necessary c
APA, Harvard, Vancouver, ISO, and other styles
40

Huang, Xiaoling, and Guodong Ye. "An Image Encryption Algorithm Based on Time-Delay and Random Insertion." Entropy 20, no. 12 (2018): 974. http://dx.doi.org/10.3390/e20120974.

Full text
Abstract:
An image encryption algorithm is presented in this paper based on a chaotic map. Different from traditional methods based on the permutation-diffusion structure, the keystream here depends on both secret keys and the pre-processed image. In particular, in the permutation stage, a middle parameter is designed to revise the outputs of the chaotic map, yielding a temporal delay phenomena. Then, diffusion operation is applied after a group of random numbers is inserted into the permuted image. Therefore, the gray distribution can be changed and is different from that of the plain-image. This inser
APA, Harvard, Vancouver, ISO, and other styles
41

Hu, Yongsheng, Han Wu, and Luoyu Zhou. "A Novel Hyperchaotic 2D-SFCF with Simple Structure and Its Application in Image Encryption." Entropy 24, no. 9 (2022): 1266. http://dx.doi.org/10.3390/e24091266.

Full text
Abstract:
In this paper, a novel image encryption algorithm is proposed based on hyperchaotic two-dimensional sin-fractional-cos-fractional (2D-SFCF), called sin-fractional-cos-fractional image-encryption (SFCF-IE). The 2D-SFCF is constructed from two one-dimensional cosine fractional (1-DCFs), and it has a more complex chaotic behavior with a larger parameter space than one-dimensional chaotic systems. Compared with the two-dimensional (2D) chaotic system, the 2D-SFCF has a simple structure, and the parameter space in the chaotic state is continuous, which is beneficial to generating the keystream in t
APA, Harvard, Vancouver, ISO, and other styles
42

Ouyang, Xue, Yuling Luo, Junxiu Liu, Lvchen Cao, and Yunqi Liu. "A color image encryption method based on memristive hyperchaotic system and DNA encryption." International Journal of Modern Physics B 34, no. 04 (2020): 2050014. http://dx.doi.org/10.1142/s0217979220500149.

Full text
Abstract:
In this paper, a color image encryption method using the memristive hyperchaotic system and deoxyribonucleic acid (DNA) encryption is proposed. First, the pseudo-random sequences are generated by a keystream generation mechanism based on a memristive hyperchaotic system and the plain image. Due to this, the memristive hyperchaotic system has a complex dynamical behavior and is highly sensitive to initial conditions, the proposed keystream generation mechanism is highly random which is also dependent on the plain images. Second, a permutation based on the cycle-shift operation is designed to el
APA, Harvard, Vancouver, ISO, and other styles
43

Bulavintsev, Vadim, Alexander Semenov, Oleg Zaikin, and Stepan Kochemazov. "A Bitslice Implementation of Anderson’s Attack on A5/1." Open Engineering 8, no. 1 (2018): 7–16. http://dx.doi.org/10.1515/eng-2018-0002.

Full text
Abstract:
Abstract The A5/1 keystream generator is a part of Global System for Mobile Communications (GSM) protocol, employed in cellular networks all over the world. Its cryptographic resistance was extensively analyzed in dozens of papers. However, almost all corresponding methods either employ a specific hardware or require an extensive preprocessing stage and significant amounts of memory. In the present study, a bitslice variant of Anderson’s Attack on A5/1 is implemented. It requires very little computer memory and no preprocessing. Moreover, the attack can be made even more efficient by harnessin
APA, Harvard, Vancouver, ISO, and other styles
44

Chen, E., Lequan Min, and Guanrong Chen. "Discrete Chaotic Systems with One-Line Equilibria and Their Application to Image Encryption." International Journal of Bifurcation and Chaos 27, no. 03 (2017): 1750046. http://dx.doi.org/10.1142/s0218127417500468.

Full text
Abstract:
This paper introduces nine four-dimensional discrete chaotic systems with one-line equilibria (DCSLE), consisting of some simple sine functions. Based on the generalized chaos synchronization (GCS) theorem, a DCSLE is used to construct an eight-dimensional DCSLE GCS system. The new DCSLE GCS system is verified by numerical simulation and then used to design a chaotic pseudorandom number generator (CPRNG). The randomness of ten 100-key streams generated by the CPRNG, two GCS-based CPRNGs, the RC4 PRNG and the ZUC PRNG are tested by the SP800-22/FIPS 140-2 tests. The test results confirm that th
APA, Harvard, Vancouver, ISO, and other styles
45

Nikhil Khandare. "CLS-SE: Continuous Location Sharing Using Geffe Generator Based Stream Cipher and Elliptic Curve Cryptography." Advances in Nonlinear Variational Inequalities 28, no. 6s (2025): 302–21. https://doi.org/10.52783/anvi.v28.4219.

Full text
Abstract:
With high end location enabled mobile devices and high speed internet connectivity, it is very common in today’s world to share location continuously with people. However this information is very sensitive as small fraction of this information may reveal unwanted things, thus encrypting this information becomes crucial. Encryption protects this information from unwanted people and thus protects privacy of individual. For encrypting continuous location data, continuous keys are needed, which are provided by keystream generator. In this research Geffe generator is used for pseudorandom keystream
APA, Harvard, Vancouver, ISO, and other styles
46

Nikhil Khandare. "CLS-SE: Continuous Location Sharing using Geffe Generator based Stream Cipher and Elliptic Curve Cryptography." Advances in Nonlinear Variational Inequalities 28, no. 7s (2025): 257–76. https://doi.org/10.52783/anvi.v28.4502.

Full text
Abstract:
With high end location enabled mobile devices and high speed internet connectivity, it is very common in today’s world to share location continuously with people. However this information is very sensitive as small fraction of this information may reveal unwanted things, thus encrypting this information becomes crucial. Encryption protects this information from unwanted people and thus protects privacy of individual. For encrypting continuous location data, continuous keys are needed, which are provided by keystream generator. In this research Geffe generator is used for pseudorandom keystream
APA, Harvard, Vancouver, ISO, and other styles
47

Mursidah, Ichsani, Suryadi MT, Sarifuddin Madenda, and Suryadi Harmanto. "Implementation of MS Circle Map in Digital Image Encryption." Applied Sciences 15, no. 13 (2025): 6998. https://doi.org/10.3390/app15136998.

Full text
Abstract:
Digital data protection is crucial to prevent unauthorized modifications and tampering. A secure, reliable, and efficient encryption technique is needed to safeguard digital images. This paper proposes a novel MS Circle Map-based image encryption algorithm, integrating chaotic dynamics for enhanced security. The encryption process begins by transforming the plain image matrix into a row vector. A secret key is then used as the initial condition for the MS Circle Map to generate a chaotic keystream. The encryption is performed through pixel diffusion using an XOR operation between the pixel int
APA, Harvard, Vancouver, ISO, and other styles
48

ZHANG, Xiaoyan, Qichun WANG, Bin WANG, and Haibin KAN. "A Constructive Method of Algebraic Attack with Less Keystream Bits." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E94-A, no. 10 (2011): 2059–62. http://dx.doi.org/10.1587/transfun.e94.a.2059.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Awad, Wasan Shaker. "Finding Linear Equivalence of Keystream Generators Using Genetic Simulated Annealing." Information Technology Journal 7, no. 3 (2008): 541–44. http://dx.doi.org/10.3923/itj.2008.541.544.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Golic, J. D., and S. V. Petrovic. "Correlation attacks on clock-controlled shift registers in keystream generators." IEEE Transactions on Computers 45, no. 4 (1996): 482–86. http://dx.doi.org/10.1109/12.494106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!