Security Provisions in Stream Ciphers Through Self Shrinking and Alternating Step Generator
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2011, Vol 2, Issue 8
Abstract
in cryptography stream ciphers used to encrypt plain text data bits one by one. The security of stream ciphers depend upon randomness of key stream, good linear span and low probability of finding the initial states of pseudorandom generators. In this paper we propose a new stream cipher model use Feed back with carry shift registers (FCSRs) as building blocks which are considered as a source of long pseudorandom generator. Proposed model is the combined structure of alternating step generator and self shrinking generators which are commonly used stream ciphers generators. In this research we compare proposed generator against self shrinking generator (SSG), Alternating step generator (ASG) and alternating step self shrinking generator (ASSG) and we concludes that proposed generator architecture is best for encryption because it satisfies all necessary conditions of a good Stream cipher.
Authors and Affiliations
Hafsa Rafiq, Malik Kiyal, Aihab Khan
Airline Sentiment Visualization, Consumer Loyalty Measurement and Prediction using Twitter Data
Social media today is an integral part of people’s daily routines and the livelihood of some. As a result, it is abundant in user opinions. The analysis of brand specific opinions can inform companies on the level of sat...
Personalized Subject Learning Based on Topic Detection and Canonical Correlation Analysis
To keep pace with the time, learning from printed medium alone is no longer a comprehensive approach. Fresh digital contents can definitely be the complement of printed education medium. Although timely access to fresh c...
Using Social Signal of Hesitation in Multimedia Content Retrieval
This paper presents the graphical analysis of selection traces in matrix-factorization space of multimedia items. A trace consists of links (lines) between points that present a selected item during interaction between u...
Assessment of IPv4 and IPv6 Networks with Different Modified Tunneling Techniques using OPNET
Currently, all the devices are using Internet protocol version 4 (IPv4) to access the internet. IP addresses of the IPv4 are now depleted from IPv4 pool announced by IANA (Internet Assigned Number Authority) in February...
Developement of Bayesian Networks from Unified Modeling Language for Learner Modelling
First of all, and to clarify our purpose, it seems important to say that the work we are presenting here lie within the framework of learner modeling in an adaptive system understood as computational modeling of the lear...