SB Sadkhan, RM Hamza - Journal of Babylon University/Pure and Applied …, 2014 - iasj.net
Stream cipher is one of the efficient cryptographic primitives to provide confidentiality of electronically transmitted data. Where it is widely used in practice (eg, in mobile phones …
A5/1 is the stream cipher algorithm used in GSM communication in order to provide over the air communication privacy. The objective of this paper is to modify the algorithm of the …
DA August, AC Smith - Cryptography, 2023 - mdpi.com
Cryptosystems employing a synchronous binary-additive stream cipher are susceptible to a generic attack called'bit-flipping', in which the ciphertext is modified to decrypt into a …
MU Bokhari, F Masoodi - Proceedings of the 4th National …, 2010 - academia.edu
In the recent past, research work has been done in the area of steam ciphers and as a result of which, many design models for stream ciphers were proposed. In Order to realize a world …
J Preuß Mattsson - International Conference on Cryptology and Network …, 2023 - Springer
Abstract Transport Layer Security (TLS) 1.3 and the Signal protocol are very important and widely used security protocols. We show that the key update function in TLS 1.3 and the …
KJ Moulood - Al-Nahrain Journal of Science, 2017 - iasj.net
In this paper we introduced a design of new pseudo random generator, which generate binary sequences that would be used as an encryption key in Stream Cipher Cryptosystem …
In the latest past, research work has been done in the region of steam ciphers and as a answer of which, several design models for stream ciphers were projected. In Order to …
M Ahmad - 2009 International Multimedia, Signal Processing …, 2009 - ieeexplore.ieee.org
Global system for mobile communication (GSM) uses A5/1 stream cipher to encrypt the information transmitted between subscribers mobile and the base station. Recent research …
SM Saleh - Engineering and Technology Journal, 2009 - iasj.net
In this paper, a secure data hiding method is introduced. It increases the security of embedded data through combining between the steganography and cryptography. First, the …