CFP last date
20 January 2025
Reseach Article

Stream Ciphers: A Comparative Study of Attacks and Structures

by Daniyal M. Alghazzawi, Syed Hamid Hasan, Mohamed Salim Trigui
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 83 - Number 1
Year of Publication: 2013
Authors: Daniyal M. Alghazzawi, Syed Hamid Hasan, Mohamed Salim Trigui
10.5120/14412-2498

Daniyal M. Alghazzawi, Syed Hamid Hasan, Mohamed Salim Trigui . Stream Ciphers: A Comparative Study of Attacks and Structures. International Journal of Computer Applications. 83, 1 ( December 2013), 27-29. DOI=10.5120/14412-2498

@article{ 10.5120/14412-2498,
author = { Daniyal M. Alghazzawi, Syed Hamid Hasan, Mohamed Salim Trigui },
title = { Stream Ciphers: A Comparative Study of Attacks and Structures },
journal = { International Journal of Computer Applications },
issue_date = { December 2013 },
volume = { 83 },
number = { 1 },
month = { December },
year = { 2013 },
issn = { 0975-8887 },
pages = { 27-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume83/number1/14412-2498/ },
doi = { 10.5120/14412-2498 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:58:15.950129+05:30
%A Daniyal M. Alghazzawi
%A Syed Hamid Hasan
%A Mohamed Salim Trigui
%T Stream Ciphers: A Comparative Study of Attacks and Structures
%J International Journal of Computer Applications
%@ 0975-8887
%V 83
%N 1
%P 27-29
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the latest past, research work has been done in the region of steam ciphers and as a answer of which, several design models for stream ciphers were projected. In Order to appreciate a international standard for data encryption that would prove good in the due course of time, endure the action of cryptanalysis algorithms and reinforce the security that will take longer to be broken, this research work was taken up. There is no standard model for Stream cipher and their design, in comparison to block ciphers, is based on a number of structures. We would not try to evaluate the different designs taken up by various stream ciphers, different attacks agreed out on these stream ciphers and the result of these attacks. During this exercise we would also have a better idea of the latest stream ciphers designs.

References
  1. Robshaw, M. J. B. , 1995. "Stream Ciphers" RSA Laboratories Technical Report TR-701Version 2. 0
  2. Rueppel, R. A. 1992. "Stream ciphers" The science of information integrity, IEEE press, New York.
  3. Mattsson, J. 2006. "Stream Cipher Design" Master of Thesis Stockholm, Sweden.
  4. Schafheutle, M. and Pyka S. 2003. Stream Ciphers. Technical report, NESSIE consortium.
  5. Rueppel, R. A. 1984. New Approaches to Stream Ciphers. PhD thesis, Swiss Federal Institute of Technology, Zurich.
  6. Kessler, G. C. 2009. "An Overview of Cryptography".
  7. Afzal, M. , Kausar, F. , and Masood, A. 2006. "Comparative Analysis of the Structures of eSTREAM Submitted Stream Ciphers", IEEE-ICET 2006
  8. Mantin, I. and Shamir, A. A Practical Attack on Broadcast RC4.
  9. Mossel, E. , Peres,Y. and Sincliar, A. 2004 "Shuffling by semi random transportations".
  10. Bear, P. 2006. Stream Cipher Design-An evaluation of the eSTREAM candidate Polar Bear, John Mattson, PhD thesis, Sweden.
  11. Babbage, S. , Canniuere, C. D. , Lano, J. , Preneel, B. , and Vandewalle. J. Cryptanalysis of SOBER-t32. In T. Johansson, editor, Fast Software Encryption, FSE 2003, number 2887 in Lecture Notes in Computer Science, pages 111{128. Springer-Verlag, 2003.
  12. Ekdahl, P. and Johansson, T. Distinguishing attacks on SOBER-t16 and t32. In J. Daemen and V. Rijmen, editors, Fast Software Encryption, FSE 2002, number 2365 in Lecture notes in Computer Science, pages 210{224. Springer-Verlag, 2002.
  13. Babbage, S. , Canniuere, C. D. , Lano, J. , Preneel, B. , and Vandewalle, J. Distinguishing attacks on SOBER-t32.
  14. Wikipedia, the free Encyclopedia.
Index Terms

Computer Science
Information Sciences

Keywords

Attacks stream cipher AES LFSR