Click for new scientific resources and news about Corona[COVID-19]

Paper Information

Journal:   SIGNAL AND DATA PROCESSING   2010 , Volume - , Number 2 (SERIAL 14); Page(s) 13 To 22.
 
Paper: 

Cryptanalysis Of The Stream Cipher Hc-256' Based On Distinguishing Attack

 
 
Author(s):  Vizandan A., Sheikhzadegan J., Mirghadri A.
 
* 
 
Abstract: 
Stream ciphers are one of the important types of symmetric ciphers that play a significant role in some applications such as network and telecommunication security. Therefore, the security analysis of such ciphers is a necessity. eSRTREAM project played a prominent role in increasing the international cryptographic activities in this field of cryptography. In this paper, we analyzed one of stream array-based ciphers using distinguishing attack. We presented two classes of distinguishers on HC- 256 ': basic and improved distinguish ers. In the basic attack, we need about 2560.3 binary key stream while we require 2555.4 key stream in the improved attack. As a result, the improved attack requires about 30 times fewer key stream bits than the basic attack.
 
Keyword(s): DISTINGUISHING ATTACK, CRYPTANALYSIS, ESTREAM, HC-256'
 
 
International related papers: 
 
Most related Highly related Moderately related Least related
 
References: 
  • Not Registered.
  •  
  •  
 
Citations: 
  • Not Registered.
 
+ Click to Cite.
APA: Copy

VIZANDAN, A., & SHEIKHZADEGAN, J., & MIRGHADRI, A. (2010). CRYPTANALYSIS OF THE STREAM CIPHER HC-256' BASED ON DISTINGUISHING ATTACK. SIGNAL AND DATA PROCESSING, -(2 (SERIAL 14)), 13-22. https://www.sid.ir/en/journal/ViewPaper.aspx?id=291159



Vancouver: Copy

VIZANDAN A., SHEIKHZADEGAN J., MIRGHADRI A.. CRYPTANALYSIS OF THE STREAM CIPHER HC-256' BASED ON DISTINGUISHING ATTACK. SIGNAL AND DATA PROCESSING. 2010 [cited 2022January27];-(2 (SERIAL 14)):13-22. Available from: https://www.sid.ir/en/journal/ViewPaper.aspx?id=291159



IEEE: Copy

VIZANDAN, A., SHEIKHZADEGAN, J., MIRGHADRI, A., 2010. CRYPTANALYSIS OF THE STREAM CIPHER HC-256' BASED ON DISTINGUISHING ATTACK. SIGNAL AND DATA PROCESSING, [online] -(2 (SERIAL 14)), pp.13-22. Available: https://www.sid.ir/en/journal/ViewPaper.aspx?id=291159.



 
 
Persian Abstract Yearly Visit 77
 
 
Latest on Blog
Enter SID Blog