SOBER-128
SOBER-128 is a synchronous stream cipher designed by Hawkes and Rose (2003) and is a member of the SOBER family of cipher In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is ''encipherment''. To encipher or encode i ...s. SOBER-128 was also designed to provide MAC (message authentication code) functionality. Watanabe and Furuya (2004) showed a weakness in the MAC generation of SOBER-128 which means an attack could forge a message with probability 2−6. MAC functionality was deleted by Qualcomm from SOBER-128 reference code. SOBER-128 takes a key up to 128 bits in length. See also * Helix * Turing References * Dai Watanabe and Soichi Furuya, A MAC Forgery Attack on SOBER-128, FSE 2004. pp472–482. * Philip Hawkes and Greg RosePrimitive Specification for SOBER-128 IACR ePrint archive, 2003. External links SOBER 12 ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
SOBER (cipher)
In cryptography, SOBER is a family of stream ciphers initially designed by Greg Rose of QUALCOMM Australia starting in 1997. The name is a contrived acronym for ''S''eventeen ''O''ctet ''B''yte ''E''nabled ''R''egister. Initially the cipher was intended as a replacement for broken ciphers in cellular telephony. The ciphers evolved, and other developers (primarily Phillip Hawkes) joined the project. SOBER was the first cipher, with a 17-byte linear-feedback shift register (LFSR), a form of decimation called ''stuttering'', and a nonlinear output filter function. The particular configuration of the shift register turned out to be vulnerable to "guess and determine" attacks. SOBER-2 changed the position of the feedback and output taps to resist the above attacks. S16 was an expansion to 16-bit words rather than bytes, with an expected increase of security. Adaptions for and since NESSIE For the NESSIE call for new cryptographic primitives, three new versions called the t-cl ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Stream Cipher
stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream ( keystream). In a stream cipher, each plaintext digit is encrypted one at a time with the corresponding digit of the keystream, to give a digit of the ciphertext stream. Since encryption of each digit is dependent on the current state of the cipher, it is also known as ''state cipher''. In practice, a digit is typically a bit and the combining operation is an exclusive-or (XOR). The pseudorandom keystream is typically generated serially from a random seed value using digital shift registers. The seed value serves as the cryptographic key for decrypting the ciphertext stream. Stream ciphers represent a different approach to symmetric encryption from block ciphers. Block ciphers operate on large blocks of digits with a fixed, unvarying transformation. This distinction is not always clear-cut: in some modes of operation, a block cipher primitive is used in such ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Turing (cipher)
__NOTOC__ Turing is a stream cipher developed by Gregory G. Rose and Philip Hawkes at Qualcomm for CDMA.Gregory G. Rose and Philip Hawkes, Turing: A Fast Stream Cipher, Fast Software Encryption 2003, pp. 290–30(PDF) Turing generates 160 bits of output in each round by applying a non-linear filter to the internal state of an LFSR. It is named after Alan Turing. It was developed based on the SOBER cipher introduced by Rose in 1998. This is evident in its major component, the Linear Feedback Shift Register (LFSR), which is the same technology found in the family of SOBER machines. Turing, however, is distinguished from its predecessors by the way it produces five words (five times more) of output for every internal update. It also provides up to 256-bit key strength and is designed to be fast in software, achieving around 5.5 cycles/byte on some x86 processors. There are experts who found that the Turing stream cipher has a number of weaknesses when faced with chosen IV attacks. ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Cipher
In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is ''encipherment''. To encipher or encode is to convert information into cipher or code. In common parlance, "cipher" is synonymous with " code", as they are both a set of steps that encrypt a message; however, the concepts are distinct in cryptography, especially classical cryptography. Codes generally substitute different length strings of characters in the output, while ciphers generally substitute the same number of characters as are input. There are exceptions and some cipher systems may use slightly more, or fewer, characters when output versus the number that were input. Codes operated by substituting according to a large codebook which linked a random string of characters or numbers to a word or phrase. For example, "UQJHSE" could be the code for "Proceed to the follow ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Message Authentication Code
In cryptography, a message authentication code (MAC), sometimes known as a ''tag'', is a short piece of information used for authenticating a message. In other words, to confirm that the message came from the stated sender (its authenticity) and has not been changed. The MAC value protects a message's data integrity, as well as its authenticity, by allowing verifiers (who also possess the secret key) to detect any changes to the message content. Terminology The term message integrity code (MIC) is frequently substituted for the term ''MAC'', especially in communications to distinguish it from the use of the latter as '' media access control address'' (''MAC address''). However, some authors use MIC to refer to a message digest, which aims only to uniquely but opaquely identify a single message. RFC 4949 recommends avoiding the term ''message integrity code'' (MIC), and instead using ''checksum'', '' error detection code'', ''hash'', ''keyed hash'', ''message authentication code'' ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Key (cryptography)
A key in cryptography is a piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic algorithm, can encode or decode cryptographic data. Based on the used method, the key can be different sizes and varieties, but in all cases, the strength of the encryption relies on the security of the key being maintained. A key’s security strength is dependent on its algorithm, the size of the key, the generation of the key, and the process of key exchange. Scope The key is what is used to encrypt data from plaintext to ciphertext. There are different methods for utilizing keys and encryption. Symmetric cryptography Symmetric cryptography refers to the practice of the same key being used for both encryption and decryption. Asymmetric cryptography Asymmetric cryptography has separate keys for encrypting and decrypting. These keys are known as the public and private keys, respectively. Purpose Since the key ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Helix (cipher)
A helix () is a shape like a corkscrew or spiral staircase. It is a type of smooth space curve with tangent lines at a constant angle to a fixed axis. Helices are important in biology, as the DNA molecule is formed as two intertwined helices, and many proteins have helical substructures, known as alpha helices. The word ''helix'' comes from the Greek word ''ἕλιξ'', "twisted, curved". A "filled-in" helix – for example, a "spiral" (helical) ramp – is a surface called ''helicoid''. Properties and types The ''pitch'' of a helix is the height of one complete helix turn, measured parallel to the axis of the helix. A double helix consists of two (typically congruent) helices with the same axis, differing by a translation along the axis. A circular helix (i.e. one with constant radius) has constant band curvature and constant torsion. A ''conic helix'', also known as a ''conic spiral'', may be defined as a spiral on a conic surface, with the distance to the apex an expo ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
International Association For Cryptologic Research
International is an adjective (also used as a noun) meaning "between nations". International may also refer to: Music Albums * ''International'' (Kevin Michael album), 2011 * ''International'' (New Order album), 2002 * ''International'' (The Three Degrees album), 1975 *''International'', 2018 album by L'Algérino Songs * The Internationale, the left-wing anthem * "International" (Chase & Status song), 2014 * "International", by Adventures in Stereo from ''Monomania'', 2000 * "International", by Brass Construction from ''Renegades'', 1984 * "International", by Thomas Leer from ''The Scale of Ten'', 1985 * "International", by Kevin Michael from ''International'' (Kevin Michael album), 2011 * "International", by McGuinness Flint from ''McGuinness Flint'', 1970 * "International", by Orchestral Manoeuvres in the Dark from '' Dazzle Ships'', 1983 * "International (Serious)", by Estelle from '' All of Me'', 2012 Politics * Political international, any transnational organizati ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Eprint
In academic publishing, an eprint or e-print is a digital version of a research document (usually a journal article, but could also be a thesis, conference paper, book chapter, or a book) that is accessible online, usually as green open access, whether from a local institutional or a central digital repository.Swan, A. and Carr, L. (2008).Institutions, their repositories and the Web". ''Serials Review'', 34 (1). When applied to journal articles, the term "eprints" covers both preprints (before peer review) and postprints (after peer review). Digital versions of materials other than research documents are not usually called e-prints, but some other name, such as e-books. See also * Electronic article * Electronic journal * Electronic publishing * Open access References {{Reflist External links What is an eprint?as defined in the FAQ section oeprints.orgby Stevan Harnad Stevan Robert Harnad (Hernád István Róbert, Hesslein István, born June 2, 1945, Budapest) is ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Broken Stream Ciphers
Broken may refer to: Literature * ''Broken'' (Armstrong novel), a 2006 novel by Kelley Armstrong in the ''Women of the Otherworld'' series * ''Broken'' (Slaughter novel), a 2010 novel by Karin Slaughter Music Albums * '' Broken (And Other Rogue States)'', a 2005 album by Luke Doucet * ''Broken'' (MBLAQ EP) (2014) * ''Broken'' (Nine Inch Nails EP), (1992) * ''Broken'' (Soulsavers album) (2009) * ''Broken'' (Straight Faced album) (1996) Songs * "Broken" (Jake Bugg song) (2013) * "Broken" (Sam Clark song) (2009) * "Broken" (Coldplay song) (2019) * "Broken" (Elisa song) (2003) * "Broken" (Lifehouse song) (2008) * "Broken" (lovelytheband song) (2017) * "Broken" (Kate Ryan song) (2011) * "Broken" (Seether song) (2004) * "Broken" (Slander and Kompany song) (2019) * "Broken", by 12 Stones from ''12 Stones'' * "Broken", by All That Remains from ''Victim of the New Disease'' * "Broken", by David Archuleta from '' Begin'' * "Broken", by Bad Religion from ''The Proc ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |