Analysis of Stream Ciphers Based on Theoretic Approach
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 110 | Views: 351

Research Paper | Electronics & Communication Engineering | India | Volume 3 Issue 9, September 2014 | Popularity: 6.2 / 10


     

Analysis of Stream Ciphers Based on Theoretic Approach

Shisif Pokhrel, Ahmed Abdul Kadhim Basheer


Abstract: This paper is intended to determine the strength of modern security systems by theoretic approach. The design of existing security system is based on complexity of algorithm and secrecy of key. Besides, several parameters exists that may be useful to determine the strength of cryptosystem. Spurious keys gives text like text as decrypted output to a cryptogram and leads to confusion in proceeding towards unique solution during cryptanalysis. A system rich in spurious keys can be considered as more secured system. This paper presents analysis on stream ciphers and provides a construct model with rich spurious keys. The paper also shows the effect of implementation of Natural Language Model in security system


Keywords: Cryptosystem, Cryptogram, Spurious Keys, Code-Points, Unicity Distance


Edition: Volume 3 Issue 9, September 2014


Pages: 1102 - 1107



Please Disable the Pop-Up Blocker of Web Browser

Verification Code will appear in 2 Seconds ... Wait



Text copied to Clipboard!
Shisif Pokhrel, Ahmed Abdul Kadhim Basheer, "Analysis of Stream Ciphers Based on Theoretic Approach ", International Journal of Science and Research (IJSR), Volume 3 Issue 9, September 2014, pp. 1102-1107, https://www.ijsr.net/getabstract.php?paperid=SEP14298, DOI: https://www.doi.org/10.21275/SEP14298

Top