Search for dissertations about: "correlation attacks"

Showing result 1 - 5 of 23 swedish dissertations containing the words correlation attacks.

  1. 1. Some results on fast correlation attacks

    Author : Fredrik Jönsson; Institutionen för elektro- och informationsteknik; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Technological sciences; stream ciphers; linear feedback shift registers; cryptology; correlation attacks; cryptanalysis; Teknik; Informatics; systems theory; Informatik; systemteori;

    Abstract : This thesis presents new results on fast correlation attacks on stream ciphers. In particular, fast correlation attacks on stream ciphers containing linear shift registers with an arbitrary number of taps, are considered. A general introduction to stream ciphers and correlation attacks is given. READ MORE

  2. 2. Some Results on Distinguishing Attacks on Stream Ciphers

    Author : Håkan Englund; Institutionen för elektro- och informationsteknik; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; correlation attack; irregularly clocked filter generator; distinguishing attacks; Stream ciphers; filter generator; Pomaranch; Dragon; LILI-128; LILI-II;

    Abstract : Stream ciphers are cryptographic primitives that are used to ensure the privacy of a message that is sent over a digital communication channel. In this thesis we will present new cryptanalytic results for several stream ciphers. READ MORE

  3. 3. Some Words on Cryptanalysis of Stream Ciphers

    Author : Alexander Maximov; Institutionen för elektro- och informationsteknik; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; VMPC; Dragon; Grain; A5 1; SNOW 2.0; Scream; large distributions; correlation attacks; distinguishing attacks; algorithms; Cryptography; cryptanalysis; RC4; RC4A; Computer science; numerical analysis; systems; control; Datalogi; numerisk analys; system; kontroll;

    Abstract : In the world of cryptography, stream ciphers are known as primitives used to ensure privacy over a communication channel. One common way to build a stream cipher is to use a keystream generator to produce a pseudo-random sequence of symbols. READ MORE

  4. 4. Towards Automation in Digital Investigations : Seeking Efficiency in Digital Forensics in Mobile and Cloud Environments

    Author : Irvin Homem; Theo Kanter; Panagiotis Papapetrou; Rahim Rahmani; Fredrik Björck; Stockholms universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Computer forensics; network forensics; mobile devices; mobile forensics; cloud computing; semantic web; hypervisors; virtualization; remote acquisition; automation; evidence analysis; correlation; P2P; bittorrent; datalogi; Computer Science; informationssäkerhet; Information Systems Security;

    Abstract : Cybercrime and related malicious activity in our increasingly digital world has become more prevalent and sophisticated, evading traditional security mechanisms. Digital forensics has been proposed to help investigate, understand and eventually mitigate such attacks. READ MORE

  5. 5. On Boolean Functions in Symmetric-Key Ciphers

    Author : Enes Pasalic; Institutionen för elektro- och informationsteknik; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; autocorrelation properties; correlation attacks; nonlinearity; resiliency; Boolean function; Stream ciphers; block ciphers; Informatics; systems theory; Informatik; systemteori;

    Abstract : This thesis discusses new results on the design and the existence of cryptographically strong Boolean functions used in the design of stream and block ciphers. By interlinking theoretical results and computer search some open problems have been solved, that is, we have shown the existence of previously unknown classes of functions. READ MORE