Generating a random sequence based on PWLCM map applicated to RC4 algorithm

2018 ◽  
Vol 7 (2.14) ◽  
pp. 182
Author(s):  
Assia Merzoug ◽  
Adda Ali-Pacha ◽  
Naima Hadj-Said ◽  
Mustafa Mamat ◽  
Mohamad Afendee Mohamed

Cryptography came into picture as a tool to secure data in storage as well as under transmission. Stream cipher has been very famous for providing data confidentiality for vital communication such that found during the military operation. Various algorithms in existence, the two most important trade-off considered would be security and efficiency. The RC4 is a symmetric stream cipher which has been widely implemented in various applications such that of Mozilla and Microsoft. Recently, the algorithm is known for having a weak key schedule which gives rise to related key attacks and thus drove the algorithm to sideline. In this work, an attempt was made to propose an improved method based on the PWLCM map to generate a random sequence in key scheduling algorithm and to use it in the RC4. The novelty in this approach is the transformation of the RC4 algorithm, into a secret key encryption, with the increase of keyspace and thus improves the secu-rity of the key scheduling and in turn the RC4 algorithm. 

2019 ◽  
Vol 8 (3) ◽  
pp. 2585-2590

An optimized key scheduling algorithm for the 64-bit block cipher CAST-128 by using dynamically substituting of S-box. In this regard, an attempt has been made to modify key scheduling algorithm for generating subkeys of a secret-key block cipher which is CAST-128 algorithm so as to enhance performance by modifying the generation of subkeys using dynamic substitution of S-box. The CAST-128 uses four static substitution of S-box to generate subkeys, where as the proposed structure generates subkeys using substitution of S-box dynamically to provides the performance of CAST-128. The approach considers different security aspects and metrics evaluation for verification


2012 ◽  
Vol 45 (1) ◽  
pp. 107-124 ◽  
Author(s):  
Raphaël van Steenberghe

Proportionality is a condition provided under both jus ad bellum and jus in bello. Based on a particular interpretation of state practice and international case law, recent legal literature argues that the two notions of proportionality are interrelated in that proportionality under jus in bello is included in the assessment of proportionality under jus ad bellum. This article seeks to refute such a position and, more generally, to clarify the relationship between the two notions of proportionality.The main argument of the article is in line with the traditional position regarding the relationship between jus ad bellum and jus in bello. It is argued that, although sharing common features and being somewhat interconnected, the notions of proportionality provided under these two separate branches of international law remain independent of each other, mainly because of what is referred to in this article as the ‘general versus particular’ dichotomy, which characterises their relations. Proportionality under jus ad bellum is to be measured against the military operation as a whole, whereas proportionality under jus in bello is to be assessed against individual military attacks launched in the framework of this operation.This article nonetheless emphasises the risk of overlap between the assessments of the two notions of proportionality when the use of force involves only one or a few military operations. Indeed, in such situations, the ‘general versus particular’ dichotomy, which normally enables one to make a distinct assessment between the two notions of proportionality, is no longer applicable since it becomes impossible to distinguish between the military operation as a whole and the individual military attacks undertaken during this operation.


2014 ◽  
Vol 2014 ◽  
pp. 1-7
Author(s):  
Lin Ding ◽  
Chenhui Jin ◽  
Jie Guan ◽  
Qiuyan Wang

Loiss is a novel byte-oriented stream cipher proposed in 2011. In this paper, based on solving systems of linear equations, we propose an improved Guess and Determine attack on Loiss with a time complexity of 2231and a data complexity of 268, which reduces the time complexity of the Guess and Determine attack proposed by the designers by a factor of 216. Furthermore, a related key chosenIVattack on a scaled-down version of Loiss is presented. The attack recovers the 128-bit secret key of the scaled-down Loiss with a time complexity of 280, requiring 264chosenIVs. The related key attack is minimal in the sense that it only requires one related key. The result shows that our key recovery attack on the scaled-down Loiss is much better than an exhaustive key search in the related key setting.


2021 ◽  
Vol 70 (7) ◽  
pp. 24-26
Author(s):  
О.А Брагина

The article is devoted to the study of military conflicts as a way to supplement the military jargon. General features of military jargon are considered. Examples of the formation of jargon in the course of military conflicts (Afghan war, Chechen war, military operation in Syria) are presented.


2021 ◽  
Vol 6 (2) ◽  
pp. 78-83
Author(s):  
Serhiy Orel ◽  
◽  
Vadim Durach ◽  
Bohdan Sjoma ◽  
◽  
...  

Military impact on the environment can be defined as two components: 1) impact on the environment in time of daily activities during the training of troops and 2) impact on the environment during the combat operation. In the Armed Forces of Ukraine, to some extent, environmental security measures are implemented only during daily operations in peacetime. As for taking into account the impact of fighting on the environment in time of planning combat operations, this issue is usually not even raised in their preparation. On the other hand, NATO member states understand that military operations can be inherently destructive to human health and the environment. Therefore, this study was conducted to determine the educational requirements for commanders, especially for officers who provide environmental protection in the Armed Forces of Ukraine, based on NATO regulations and the experience of Allies. The article considers how environmental issues are integrated into the military operation at each stage: planning, pre-deployment, deployment (execution and force rotation), redeployment, and post-deployment. The main tasks of environmental officers at each stage of the operation are defined. Based on the tasks solved by officers, the requirements for their education are formed, the subjects studied by US environmental officers are considered.


2020 ◽  
Vol 16 (1) ◽  
pp. 11-18 ◽  
Author(s):  
Nagendar Yerukala ◽  
V Kamakshi Prasad ◽  
Allam Apparao

For a stream cipher to be secure, the keystream generated by it should be uniformly random with parameter 1/2.Statistical tests check whether the given sequence follow a certain probability distribution. In this paper, we perform a detailed statistical analysis of various stream ciphers used in GSM 2G,3G, 4G and 5G communications. The sequences output by these ciphers are checked for randomness using the statistical tests defined by the NIST Test Suite. It should also be not possible to derive any information about secret key and the initial state ofthe cipher from the keystream. Therefore, additional statisticaltests based on properties like Correlation between Keystreamand Key, and Correlation between Keystream and IV are also performed. Performance analysis of the ciphers also has been done and the results tabulated. Almost all the ciphers pass thetests in the NIST test suite with 99% confidence level. For A5/3stream cipher, the correlation between the keystream and key is high and correlation between the keystream and IV is low when compared to other ciphers in the A5 family.


Sensors ◽  
2020 ◽  
Vol 20 (23) ◽  
pp. 6909
Author(s):  
Francisco Eugenio Potestad-Ordóñez ◽  
Manuel Valencia-Barrero ◽  
Carmen Baena-Oliva ◽  
Pilar Parra-Fernández ◽  
Carlos Jesús Jiménez-Fernández

One of the best methods to improve the security of cryptographic systems used to exchange sensitive information is to attack them to find their vulnerabilities and to strengthen them in subsequent designs. Trivium stream cipher is one of the lightweight ciphers designed for security applications in the Internet of things (IoT). In this paper, we present a complete setup to attack ASIC implementations of Trivium which allows recovering the secret keys using the active non-invasive technique attack of clock manipulation, combined with Differential Fault Analysis (DFA) cryptanalysis. The attack system is able to inject effective transient faults into the Trivium in a clock cycle and sample the faulty output. Then, the internal state of the Trivium is recovered using the DFA cryptanalysis through the comparison between the correct and the faulty outputs. Finally, a backward version of Trivium was also designed to go back and get the secret keys from the initial internal states. The key recovery has been verified with numerous simulations data attacks and used with the experimental data obtained from the Application Specific Integrated Circuit (ASIC) Trivium. The secret key of the Trivium were recovered experimentally in 100% of the attempts, considering a real scenario and minimum assumptions.


2015 ◽  
Vol 781 ◽  
pp. 543-546
Author(s):  
Piyanart Chotikawanid ◽  
Kharittha Thongkor ◽  
Thumrongrat Amornraksa

This paper proposes a spatial domain image watermarking method based on homomorphic filter. In the proposed method, after applying the homomorphic filter to the host color image, a watermark image is embedded into the natural logarithm reflectance component of the image. Based on the concept that the reflectance component contains most of the image details with low energy, the watermark energy added to this component will be imperceptually noticed by the human eye. The embedding watermark is also protected by a key-based stream cipher, so that without the correct secret key, one cannot reconstruct the watermark. To identify the existence of the embedded watermark, the semi-blind detection approach is applied. The performance of the proposed method in terms of correlation coefficient between the original and extracted watermarks is measured and presented. Its robustness against image blurring and image sharpening at various strengths is also evaluated. The results show the potential of the proposed method for a practical system.


Sign in / Sign up

Export Citation Format

Share Document