Search for dissertations about: "distinguishing attacks"

Showing result 1 - 5 of 7 swedish dissertations containing the words distinguishing attacks.

  1. 1. Some Results on Distinguishing Attacks on Stream Ciphers

    Author : Håkan Englund; Institutionen för elektro- och informationsteknik; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; correlation attack; irregularly clocked filter generator; distinguishing attacks; Stream ciphers; filter generator; Pomaranch; Dragon; LILI-128; LILI-II;

    Abstract : Stream ciphers are cryptographic primitives that are used to ensure the privacy of a message that is sent over a digital communication channel. In this thesis we will present new cryptanalytic results for several stream ciphers. READ MORE

  2. 2. Some Words on Cryptanalysis of Stream Ciphers

    Author : Alexander Maximov; Institutionen för elektro- och informationsteknik; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; VMPC; Dragon; Grain; A5 1; SNOW 2.0; Scream; large distributions; correlation attacks; distinguishing attacks; algorithms; Cryptography; cryptanalysis; RC4; RC4A; Computer science; numerical analysis; systems; control; Datalogi; numerisk analys; system; kontroll;

    Abstract : In the world of cryptography, stream ciphers are known as primitives used to ensure privacy over a communication channel. One common way to build a stream cipher is to use a keystream generator to produce a pseudo-random sequence of symbols. READ MORE

  3. 3. Contributions to Confidentiality and Integrity Algorithms for 5G

    Author : Jing Yang; Nätverk och säkerhet; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Stream ciphers; 5G; Confidentiality and integrity algorithms; SNOW-V; SNOW-Vi; Local pseudorandom generators; SNOW 3G; ZUC-256; Linear cryptanalysis; Guess-and-determine attacks;

    Abstract : The confidentiality and integrity algorithms in cellular networks protect the transmission of user and signaling data over the air between users and the network, e.g., the base stations. READ MORE

  4. 4. On LFSR based Stream Ciphers - analysis and design

    Author : Patrik Ekdahl; Institutionen för elektro- och informationsteknik; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; self-shrinking generator; shrinking generator; E0; A5; sober; stream cipher; LFSR; snow; Informatics; systems theory; Informatik; systemteori;

    Abstract : Stream ciphers are cryptographic primitives used to ensure privacy in digital communication. In this thesis we focus on stream ciphers built using Linear Feedback Shift Registers (LFSRs). Several different stream ciphers are analysed and new attacks are presented. In addition, two new stream ciphers are presented, both based on the same design. READ MORE

  5. 5. On the Design and Analysis of Stream Ciphers

    Author : Martin Hell; Institutionen för elektro- och informationsteknik; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; weak feedback polynomials; bit-search generator; self-shrinking generator; Achterbahn; Pomaranch; Grain-128; Grain; stream ciphers; cryptography; cryptanalysis; Informatics; systems theory; Informatik; systemteori;

    Abstract : This thesis presents new cryptanalysis results for several different stream cipher constructions. In addition, it also presents two new stream ciphers, both based on the same design principle. The first attack is a general attack targeting a nonlinear combiner. READ MORE