Stream Ciphers in Modern Real time IT Systems

Stream Ciphers in Modern Real time IT Systems
Author: Alexandr Alexandrovich Kuznetsov,Oleksandr Volodymyrovych Potii,Nikolay Alexandrovich Poluyanenko,Yurii Ivanovich Gorbenko,Natalia Kryvinska
Publsiher: Springer Nature
Total Pages: 593
Release: 2021-11-19
Genre: Technology & Engineering
ISBN: 9783030797706

Download Stream Ciphers in Modern Real time IT Systems Book in PDF, Epub and Kindle

This book provides the most complete description, analysis, and comparative studies of modern standardized and most common stream symmetric encryption algorithms, as well as stream modes of symmetric block ciphers. Stream ciphers provide an encryption in almost real-time regardless of the volume and stream bit depth of converted data, which makes them the most popular in modern real-time IT systems. In particular, we analyze the criteria and performance indicators of algorithms, as well as the principles and methods of designing stream ciphers. Nonlinear-feedback shift registers, which are one of the main elements of stream ciphers, have been studied in detail. The book is especially useful for scientists, developers, and experts in the field of cryptology and electronic trust services, as well as for the training of graduate students, masters, and bachelors in the field of information security.

Analysis and Design of Stream Ciphers

Analysis and Design of Stream Ciphers
Author: Rainer A. Rueppel
Publsiher: Springer Science & Business Media
Total Pages: 256
Release: 2012-12-06
Genre: Technology & Engineering
ISBN: 9783642828652

Download Analysis and Design of Stream Ciphers Book in PDF, Epub and Kindle

It is now a decade since the appearance of W. Diffie and M. E. Hellmann's startling paper, "New Directions in Cryptography". This paper not only established the new field of public-key cryptography but also awakened scientific interest in secret-key cryptography, a field that had been the almost exclusive domain of secret agencies and mathematical hobbyist. A number of ex cellent books on the science of cryptography have appeared since 1976. In the main, these books thoroughly treat both public-key systems and block ciphers (i. e. secret-key ciphers with no memo ry in the enciphering transformation) but give short shrift to stream ciphers (i. e. , secret-key ciphers wi th memory in the enciphering transformation). Yet, stream ciphers, such as those . implemented by rotor machines, have played a dominant role in past cryptographic practice, and, as far as I can determine, re main still the workhorses of commercial, military and diplomatic secrecy systems. My own research interest in stream ciphers found a natural re sonance in one of my doctoral students at the Swiss Federal Institute of Technology in Zurich, Rainer A. Rueppe1. As Rainer was completing his dissertation in late 1984, the question arose as to where he should publish the many new results on stream ciphers that had sprung from his research.

Stream Ciphers

Stream Ciphers
Author: Andreas Klein
Publsiher: Springer Science & Business Media
Total Pages: 399
Release: 2013-04-08
Genre: Computers
ISBN: 9781447150794

Download Stream Ciphers Book in PDF, Epub and Kindle

In cryptography, ciphers is the technical term for encryption and decryption algorithms. They are an important sub-family that features high speed and easy implementation and are an essential part of wireless internet and mobile phones. Unlike block ciphers, stream ciphers work on single bits or single words and need to maintain an internal state to change the cipher at each step. Typically stream ciphers can reach higher speeds than block ciphers but they can be more vulnerable to attack. Here, mathematics comes into play. Number theory, algebra and statistics are the key to a better understanding of stream ciphers and essential for an informed decision on their safety. Since the theory is less developed, stream ciphers are often skipped in books on cryptography. This book fills this gap. It covers the mathematics of stream ciphers and its history, and also discusses many modern examples and their robustness against attacks. Part I covers linear feedback shift registers, non-linear combinations of LFSRs, algebraic attacks and irregular clocked shift registers. Part II studies some special ciphers including the security of mobile phones, RC4 and related ciphers, the eStream project and the blum-blum-shub generator and related ciphers. Stream Ciphers requires basic knowledge of algebra and linear algebra, combinatorics and probability theory and programming. Appendices in Part III help the reader with the more complicated subjects and provides the mathematical background needed. It covers, for example, complexity, number theory, finite fields, statistics, combinatorics. Stream Ciphers concludes with exercises and solutions and is directed towards advanced undergraduate and graduate students in mathematics and computer science.

Applied Cryptanalysis

Applied Cryptanalysis
Author: Mark Stamp,Richard M. Low
Publsiher: John Wiley & Sons
Total Pages: 424
Release: 2007-06-15
Genre: Computers
ISBN: 0470148764

Download Applied Cryptanalysis Book in PDF, Epub and Kindle

The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material in the text. This would be particularly valuable to working professionals who might want to use the book as a way to quickly gain some depth on one specific topic.

Information Security Technologies in the Decentralized Distributed Networks

Information Security Technologies in the Decentralized Distributed Networks
Author: Roman Oliynykov,Oleksandr Kuznetsov,Oleksandr Lemeshko,Tamara Radivilova
Publsiher: Springer Nature
Total Pages: 315
Release: 2022-04-03
Genre: Computers
ISBN: 9783030951610

Download Information Security Technologies in the Decentralized Distributed Networks Book in PDF, Epub and Kindle

The authors explore various aspects of information processing for the design of service systems, efficient management, secure storage, and transmission. In addition, the subline provides knowledge and practice in decentralized ICT technologies, including those based on blockchain. The aim of this book is to analyze and develop methods of building decentralized private databases without the presence of a trusted party, methods of data processing in encrypted form to ensure the confidentiality of information, and accessibility of the corresponding fragment of the original or transformed data. In this book it is also relevant to research methods and protocols routing in infocommunication networks, which provides load balancing in the network, and analysis of intrusion detection methods based on analysis of signatures and anomalies in network behavior (state changes) based on machine learning and fractal analysis methods.

Design and Cryptanalysis of ZUC

Design and Cryptanalysis of ZUC
Author: Chandra Sekhar Mukherjee,Dibyendu Roy,Subhamoy Maitra
Publsiher: Springer Nature
Total Pages: 112
Release: 2021-01-27
Genre: Computers
ISBN: 9789813348820

Download Design and Cryptanalysis of ZUC Book in PDF, Epub and Kindle

This book is a timely document of state-of-the art analytical techniques in the domain of stream cipher design and analysis with a specific cipher, named ZUC. It links new research to brief contextual literature review in the domain of complex LFSR-based stream ciphers. A snapshot of how stream ciphers are deployed in the mobile telephony architecture, one of the most well-known topics for more than five decades in the domain of computer and communication sciences, is presented in this book. The book provides an in-depth study on design and cryptanalysis of ZUC as well as relevant research results in this field with directions towards future analysis of this cipher.

Advances in Artificial Intelligence and Data Engineering

Advances in Artificial Intelligence and Data Engineering
Author: Niranjan N. Chiplunkar,Takanori Fukao
Publsiher: Springer Nature
Total Pages: 1456
Release: 2020-08-13
Genre: Technology & Engineering
ISBN: 9789811535147

Download Advances in Artificial Intelligence and Data Engineering Book in PDF, Epub and Kindle

This book presents selected peer-reviewed papers from the International Conference on Artificial Intelligence and Data Engineering (AIDE 2019). The topics covered are broadly divided into four groups: artificial intelligence, machine vision and robotics, ambient intelligence, and data engineering. The book discusses recent technological advances in the emerging fields of artificial intelligence, machine learning, robotics, virtual reality, augmented reality, bioinformatics, intelligent systems, cognitive systems, computational intelligence, neural networks, evolutionary computation, speech processing, Internet of Things, big data challenges, data mining, information retrieval, and natural language processing. Given its scope, this book can be useful for students, researchers, and professionals interested in the growing applications of artificial intelligence and data engineering.

RC4 Stream Cipher and Its Variants

RC4 Stream Cipher and Its Variants
Author: Goutam Paul,Subhamoy Maitra
Publsiher: CRC Press
Total Pages: 313
Release: 2011-11-16
Genre: Computers
ISBN: 9781439831359

Download RC4 Stream Cipher and Its Variants Book in PDF, Epub and Kindle

RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With extensive expertise in stream cipher cryptanalysis and RC4 research, the authors focus on the analysis and design issues of RC4. They also explore variants of RC4 and the eSTREAM finalist HC-128. After an introduction to the vast field of cryptology, the book reviews hardware and software stream ciphers and describes RC4. It presents a theoretical analysis of RC4 KSA, discussing biases of the permutation bytes toward secret key bytes and absolute values. The text explains how to reconstruct the secret key from known state information and analyzes the RC4 PRGA in detail, including a sketch of state recovery attacks. The book then describes three popular attacks on RC4: distinguishing attacks, Wired Equivalent Privacy (WEP) protocol attacks, and fault attacks. The authors also compare the advantages and disadvantages of several variants of RC4 and examine stream cipher HC-128, which is the next level of evolution after RC4 in the software stream cipher paradigm. The final chapter emphasizes the safe use of RC4. With open research problems in each chapter, this book offers a complete account of the most current research on RC4.