Comparative Study between Stream Cipher and Block Cipher using RC4 and Hill Cipher

2010 ◽  
Vol 1 (25) ◽  
pp. 15-21 ◽  
Author(s):  
Shish Ahmad ◽  
DR. Mohd. Rizwan beg ◽  
Dr. Qamar Abbas ◽  
Jameel Ahmad ◽  
Syed Mohd Atif
2011 ◽  
Vol 128-129 ◽  
pp. 637-641
Author(s):  
Lan Luo ◽  
Qiong Hai Dai ◽  
Chun Xiang Xu ◽  
Shao Quan Jiang

The cipher algorithms are categorized by block cipher, stream cipher and HASH, and they are weighed in faithful transmission which is known as independent condition. In faithful transmission, the ciphers are studied because of their root cipher. Intelligent application of ciphers is a direction that uses Bayesian model of cognition science. Bayesian inference is a rational engine for solving such problems within a probabilistic framework, and consequently is the heart of most probabilistic models of weighing the ciphers. The approach of this paper is that ciphers, which are considered as a suitable weight cipher to kinds of networks, are ranged based on root ciphers. This paper shows the other kinds of transformation among the different cipher algorithms themselves.


Author(s):  
Keith M. Martin

In this chapter, we focus on symmetric encryption. We begin by identifying two different types of symmetric encryption algorithm, namely, stream and block ciphers. We discuss the basic idea behind a stream cipher and consider their properties and applications. We then introduce block ciphers. We focus on two extremely important and influential block cipher algorithms, the Data Encryption Standard and the Advanced Encryption Standard, discussing the history of their development as well as their basic design. We then introduce the modes of operation of a block cipher, explaining why different modes have been proposed. We examine in detail four of the most well-established modes of operation and their core properties, as well as classifying other modes of operation.


2014 ◽  
Vol 644-650 ◽  
pp. 2768-2771
Author(s):  
Hui Shi ◽  
Jian Wei Lu ◽  
Yu Feng Ji ◽  
Chao Wu ◽  
Jing Gong ◽  
...  

The key-stream generator is the most important algorithm component of the stream cipher and the security of the stream cipher is based on the property of the key-stream generator. At the present, it is still an important development direction of the stream cipher algorithm that the high performance key-stream generators are constructed with complex block cipher algorithms. This paper puts forward the new type of the key-stream generator based on the AES algorithm. This method is based on the OFB mode of the AES algorithm, combined with the variable-step feedback shift. Then the paper analyses the randomness of the key-stream produced by the new key-stream generator. This new key-stream generator really improves the cryptographic properties of the key stream generator and to enhance the security of stream cipher effectively.


2018 ◽  
Vol 1 (2) ◽  
pp. 64
Author(s):  
Dian Eka Wijayanti

Affine Cipher Cryptography Technique is one of the techniques in classical cryptography which is quite simple so it is very vulnerable to cryptanalysis. Affine cipher's advantage is having an algorithm that can be modified with various techniques. The modifications that can be made to Affine Cipher is to combine Affine cipher's algorithm with other ciphers, replace Affine cipher's key with various functions and matrices and expand the space for plaintext and ciphertexts on Affine cipher. Affine cipher can also be applied to the stream cipher as a keystream generator. This research discusses several modifications of Affine cipher algorithm and performs several other modifications.  These modifications are combining Affine Chiper and Vigenere Cipher on , combining Affine, Vigenere and Hill Cipher with invertible matrix applications on . Furthermore, a comparison of the three modifications will be carried out to obtain a new cryptographic method that is more resilient to the cryptanalysis process.


Author(s):  
Mohammad A. AlAhmad

<span>This paper introduces a new cryptographic hash function that follows sponge construction. Paper begins with outlining the structure of the construction. Next part describes the functionality of Titanium and cipher used. A competition between block cipher and stream cipher is presented and showed the reason of using block cipher rather than stream cipher. Speed performance is calculated and analyzed using state-of-art CPUs.</span>


2018 ◽  
Vol 8 (3) ◽  
pp. 205
Author(s):  
R. Benny Gandara

Standar IEEE 802.15.4 merupakan standar acuan pengembangan protokol yang diterapkan untuk teknologi industrial wireless sensor network pada saat ini. Unsur keamanan data dalam industrial wireless sensor network perlu untuk diperhatikan karena dampak gangguan yang timbul akan dapat berpengaruh secara langsung pada proses industri yang sedang beroperasi dan berdampak pada keselamatan pekerja, peralatan dan lingkungan serta keekonomian. Metode enkripsi adalah metode umum yang dipergunakan dalam perlindungan data pada sistem wireless sensor network. Metode enkripsi pada layer physical dengan menggunakan algoritma stream cipher Rabbit dipergunakan sebagai metode alternatif perlindungan data pada sistem aplikasi industrial wireless sensor network yang mana pada umumnya menggunakan metode enkripsi block cipher pada lapisan upper layer. Algoritma Rabbit akan dibandingkan dengan algoritma RC4 yang telah diteliti sebelumnya. Dari hasil simulasi, algoritma Rabbit dengan jumlah kunci yang lebih pendek dan cipher text yang lebih sedikit dapat memberikan hasil yang lebih baik untuk nilai avalanche effect, entrophy dan penggunaan CPU dibandingkan dengan algoritma RC4. Meskipun mendapatkan hasil yang bervariasi pada penggunaan memori dan end to end delay, algoritma Rabbit pada jumlah node tertentu masih dapat memenuhi standar kebutuhan industri untuk aplikasi sektor migas.


2014 ◽  
Vol 529 ◽  
pp. 430-433
Author(s):  
Hui Shi ◽  
Xu Dong Qian ◽  
Jian Wei Lu ◽  
Jing Gong ◽  
Yuan Qing Deng

The key-stream generator is the most important algorithm component of the stream cipher. At the present, it is an important development direction of the stream cipher algorithm that uses complex block cipher algorithms to construct high performance key-stream generators. The paper puts forward a new design method of the key-stream generator based on the AES algorithm. This method is based on the CFB mode of the AES algorithm, combined with the variable-step feedback shift. Then the paper analyses the randomness of the key-stream produced by the new key-stream generator. This new key-stream generator really improves the cryptographic properties of the key stream generator and to enhance the security of stream cipher.


Sign in / Sign up

Export Citation Format

Share Document