Analysis of Stream Ciphers Based on Theoretic Approach
Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 9)Publication Date: 2014-09-05
Authors : Shisif Pokhrel; Ahmed Abdul Kadhim Basheer;
Page : 1102-1107
Keywords : Cryptosystem; Cryptogram; Spurious Keys; Code-Points; Unicity Distance;
Abstract
This paper is intended to determine the strength of modern security systems by theoretic approach. The design of existing security system is based on complexity of algorithm and secrecy of key. Besides, several parameters exists that may be useful to determine the strength of cryptosystem. Spurious keys gives text like text as decrypted output to a cryptogram and leads to confusion in proceeding towards unique solution during cryptanalysis. A system rich in spurious keys can be considered as more secured system. This paper presents analysis on stream ciphers and provides a construct model with rich spurious keys. The paper also shows the effect of implementation of Natural Language Model in security system
Other Latest Articles
- Simulation of ECG signal using Advanced Virtual Instrumentation system Based on LAB VIEW
- Variations in the Number of Absorptive Columnar Cells and Goblet Cells in the Human Duodenal Mucosa - An Age Related Study
- Optimization of DNA Isolation and PCR Protocol for ISSR Analysis of Species of Spilanthes - A Medicinal Herb from Peninsular India
- Exchange Rate Pass-Through, Monetary Policy and Price Stability in Nigeria
- Benthic Foraminiferal Distribution from Mahabalipuram - Marakkanam Offshore, East Coast of India
Last modified: 2021-06-30 21:07:44