Downloads: 110
Research Paper | Electronics & Communication Engineering | India | Volume 3 Issue 9, September 2014
Analysis of Stream Ciphers Based on Theoretic Approach
Shisif Pokhrel | Ahmed Abdul Kadhim Basheer [3]
Abstract: This paper is intended to determine the strength of modern security systems by theoretic approach. The design of existing security system is based on complexity of algorithm and secrecy of key. Besides, several parameters exists that may be useful to determine the strength of cryptosystem. Spurious keys gives text like text as decrypted output to a cryptogram and leads to confusion in proceeding towards unique solution during cryptanalysis. A system rich in spurious keys can be considered as more secured system. This paper presents analysis on stream ciphers and provides a construct model with rich spurious keys. The paper also shows the effect of implementation of Natural Language Model in security system
Keywords: Cryptosystem, Cryptogram, Spurious Keys, Code-Points, Unicity Distance
Edition: Volume 3 Issue 9, September 2014,
Pages: 1102 - 1107
Similar Articles with Keyword 'Cryptosystem'
Downloads: 103
M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 5, May 2015
Pages: 3221 - 3230Implementation of RSA Cryptosystem Using Ancient Indian Vedic Mathematics
Shahina M. Salim | Sonal A. Lakhotiya
Downloads: 110
M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2600 - 2606Design and Implementation of Galios Field Based AES-256 Algorithm for Optimized Cryptosystem
Veerendra Babu Dara | P. Sankara Rao