Security of Symmetric Ratchets and Key Chains-Implications for Protocols like TLS 1.3, Signal, and PQ3

JP Mattsson - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Symmetric ratchets and one-way key chains play a vital role in numerous important security
protocols such as TLS 1.3, DTLS 1.3, QUIC, Signal, MLS, EDHOC, OSCORE, and Apple …

[PDF][PDF] A study of Algebraic Attack and proposed developed clock control stream cipher

SB Sadkhan, RM Hamza - Journal of Babylon University/Pure and Applied …, 2014 - iasj.net
Stream cipher is one of the efficient cryptographic primitives to provide confidentiality of
electronically transmitted data. Where it is widely used in practice (eg, in mobile phones …

[PDF][PDF] Modified A5/1 Based Stream Cipher For Modified A5/1 Based Stream Cipher For Secured GSM Communication Communication

NH Zakaria, K Seman, I Abdullah - IJCSNS, 2011 - researchgate.net
A5/1 is the stream cipher algorithm used in GSM communication in order to provide over the
air communication privacy. The objective of this paper is to modify the algorithm of the …

PudgyTurtle Mode Resists Bit-Flipping Attacks

DA August, AC Smith - Cryptography, 2023 - mdpi.com
Cryptosystems employing a synchronous binary-additive stream cipher are susceptible to a
generic attack called'bit-flipping', in which the ciphertext is modified to decrypt into a …

[PDF][PDF] Comparative analysis of structures and attacks on various stream ciphers

MU Bokhari, F Masoodi - Proceedings of the 4th National …, 2010 - academia.edu
In the recent past, research work has been done in the area of steam ciphers and as a result
of which, many design models for stream ciphers were proposed. In Order to realize a world …

Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal

J Preuß Mattsson - International Conference on Cryptology and Network …, 2023 - Springer
Abstract Transport Layer Security (TLS) 1.3 and the Signal protocol are very important and
widely used security protocols. We show that the key update function in TLS 1.3 and the …

[PDF][PDF] New Address Shift Linear Feedback Shift Register Generator

KJ Moulood - Al-Nahrain Journal of Science, 2017 - iasj.net
In this paper we introduced a design of new pseudo random generator, which generate
binary sequences that would be used as an encryption key in Stream Cipher Cryptosystem …

[PDF][PDF] Stream Ciphers: A comparative study of attacks and structures

DM Alghazzawi, SH Hasan, MSA Trigui - International Journal of …, 2013 - kau.edu.sa
In the latest past, research work has been done in the region of steam ciphers and as a
answer of which, several design models for stream ciphers were projected. In Order to …

Enhanced A5/1 cipher with improved linear complexity

M Ahmad - 2009 International Multimedia, Signal Processing …, 2009 - ieeexplore.ieee.org
Global system for mobile communication (GSM) uses A5/1 stream cipher to encrypt the
information transmitted between subscribers mobile and the base station. Recent research …

[PDF][PDF] Enhancing Embedded Data Security By Turns Cipher Block Chaining Mode Into Stream Cipher

SM Saleh - Engineering and Technology Journal, 2009 - iasj.net
In this paper, a secure data hiding method is introduced. It increases the security of
embedded data through combining between the steganography and cryptography. First, the …