18 research outputs found

    Analysis of chosen plaintext attacks on the WAKE Stream Cipher

    Get PDF
    Stream ciphers are an important class of encryption algorithms, which are widely used in practice. In this paper the security of the WAKE stream cipher is investigated. We present two chosen plaintext attacks on this cipher. The complexities of these attacks can be estimated as 10^^19.2 and 10^^14.4

    A known plaintext attack on the ISAAC keystream generator

    Get PDF
    Stream ciphers are often used in applications where high speed and low delay are a requirement. The ISAAC keystream generator is a fast software-oriented encryption algorithm. In this papers the security of the ISAAC keystream generator is investigated. Cryptanalytic algorithm is developed for a known plaintext attack where only a small segment of plaintext is assumed to be known. Keywords. ISAAC. Keystream generator. Cryptanalysis

    Statistical weaknesses in the alleged RC4 keystream generator

    Get PDF
    A large number of stream cipher were proposed and implemented over the last twenty years. In 1987 Rivest designed the RC4 stream cipher, which was based on a different and more software friendly paradigm. It was integrated into Microsoft Windows, Lotus Notes, Apple AOCE, Oracle Secure SQL, and many other applications, and has thus become the most widely used a software-based stream cipher. In this paper we describe some properties of an output sequence of RC4. It is proved that the distribution of first, second output values of RC4 and digraphs are not uniform, which makes RC4 trivial to distinguish between short outputs of RC4 and random strings by analyzing their first, or second output values of RC4 or digraphs

    Properties of the Transformation Semigroup of the Solitaire Stream Cipher

    Get PDF
    Stream ciphers are often used in applications where high speed and low delay are a requirement. The Solitaire stream cipher was developed by B. Schneier as a paper-and-pencil cipher. Solitaire gets its security from the inherent randomness in a shuffled deck of cards. In this paper we investigate semigroups and groups properties of the Solitaire stream cipher and its regular modifications

    Attracting Human Resources to Arctic Enterprises Using Marketing Tools

    Get PDF
    In connection with the movement of various types of production in the Arctic region, it becomes necessary to attract human resources to new enterprises. In the article, we analyze the branding system in companies operating in the Arctic region, as one of the most effective areas in marketing activities in the labor market. The study aims at investigating marketing tools that can eliminate the lack of qualified personnel in well-known companies, e.g., Rosatom, Rosneft, PhosAgro, Eurochem, Novatek, Lukoil, Severstal, Gazprom Neft, and Norilsk Nickel. Particular attention is paid to analyzing the branding of organizations, i.e., the main tool for attracting human capital to enterprises. The components of branding are considered, i.e., the brand itself, mission, purpose, and image. A table was compiled illustrating the listed elements for each company. It takes a detailed look at which companies should try to change branding elements to attract more attention from job seekers. The study of the key concepts of branding helped to draw appropriate conclusions about the need to reform marketing tools, which are not developed to one degree or another in the investigated companies

    Cryptanalysis of the Vesta-2M Stream Cipher ", presented at the Rump

    No full text
    Abstract. In this paper the security of the stream cipher Vesta-2M is investigated. Cryptanalytic algorithm is developed for a known plaintext attack where only a small segment of plaintext is assumed to be known. The complexity the attack is estimated the time of searching through the square root of all possible initial states. Keywords. Cryptanalysis. Stream Cipher. Vesta-2M.

    Cryptanalysis of the Vesta-2M Stream Cipher

    Get PDF
    . In this paper the security of the stream cipher Vesta-2M is investigated. Cryptanalytic algorithm is developed for a known plaintext attack where only a small segment of plaintext is assumed to be known. The complexity the attack is estimated the time of searching through the square root of all possible initial states

    The number of initial states of the RC4 cipher with the same cycle structure

    Get PDF
    RC4 cipher is the most widely used stream cipher in software applications. It was designed by R. Rivest in 1987. In this paper we find the number of keys of the RC4 cipher generating initial permutations with the same cycle structure. We obtain that the distribution of initial permutations is not uniform. 1

    Analysis of chosen plaintext attacks on the WAKE Stream Cipher

    No full text
    Abstract. Stream ciphers are an important class of encryption algorithms, which are widely used in practice. In this paper the security of the WAKE stream cipher is investigated. We present two chosen plaintext attacks on this cipher. The complexities of these attacks can be estimated as 10 19.2 and 10 14.4. Keywords. WAKE. Stream Cipher. Cryptanalysis.
    corecore