Security Provisions in Stream Ciphers Through Self Shrinking and Alternating Step Generator
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2011, Vol 2, Issue 8
Abstract
in cryptography stream ciphers used to encrypt plain text data bits one by one. The security of stream ciphers depend upon randomness of key stream, good linear span and low probability of finding the initial states of pseudorandom generators. In this paper we propose a new stream cipher model use Feed back with carry shift registers (FCSRs) as building blocks which are considered as a source of long pseudorandom generator. Proposed model is the combined structure of alternating step generator and self shrinking generators which are commonly used stream ciphers generators. In this research we compare proposed generator against self shrinking generator (SSG), Alternating step generator (ASG) and alternating step self shrinking generator (ASSG) and we concludes that proposed generator architecture is best for encryption because it satisfies all necessary conditions of a good Stream cipher.
Authors and Affiliations
Hafsa Rafiq, Malik Kiyal, Aihab Khan
Development of the System to Support Tourists’ Excursion Behavior using Augmented Reality
The purpose of this study is to develop an information system (AR recommended GIS) to support tourists’ excursion behavior by making the accumulating, sharing, and recommending of information concerning urban tourist spo...
Optimal Design of a Variable Coefficient Fractional Order PID Controller by using Heuristic Optimization Algorithms
This paper deals with an optimal design of a new type Variable coefficient Fractional Order PID (V-FOPID) controller by using heuristic optimization algorithms. Although many studies have mainly paid attention to correct...
Reversible Anonymization of DICOM Images using Cryptography and Digital Watermarking
Digital Imaging and Communications in Medicine (DICOM) is a standard for handling, storing, printing, and transmitting information in medical images. The DICOM file contains the image data and a number of attribute...
A Comparison of Collaborative Access Control Models
Collaborative environments need access control to data and resources to increase working cooperation efficiently yet effectively. Several approaches are proposed and multiple access control models are recommended in this...
Exploring Factors Associated with Voucher Program for Speech Language Therapy for the Preschoolers of Parents with Communication Disorder using Weighted Random Forests
It is necessary to identify the demand level of consumers and recognize the support target priority based on it in order to provide efficient services with a limited budget. This study provided baseline data for spreadin...