{"title":"现代流密码中的密码分析弱点和提高其安全级别的建议","authors":"S. Ullah, A. A. Tabassam, S. H. Khiyal","doi":"10.1109/ICET.2005.1558887","DOIUrl":null,"url":null,"abstract":"Inthis paperwediscuiss security problems insom'1e modern stream ciphers. Asweobserve somie tinmes that adesigner claims that thealgorithm designed is mnore secure butt whenitcomestoopenliteratuire we finda numberQfproblems. We discuss SNOW, Scream andRabbit. Someejforts havebeenmadeto overcome theproblems those werepointed outin these cryptosystems bvdifferent cryptanalysts. The stream ciphers arefaster andefficient thanblock ciphers butconmparatively less secure. Ouremphasis inthis paperistomak-e somecompromise on efficiency buttogetnmor-e security. IndexTerms- Streamciphers, Blockciphers, SNOW,Scream, Rabbit, chaotic.","PeriodicalId":222828,"journal":{"name":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Cryptanalytic weaknesses in modern stream ciphers and recommendations for improving their security levels\",\"authors\":\"S. Ullah, A. A. Tabassam, S. H. Khiyal\",\"doi\":\"10.1109/ICET.2005.1558887\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Inthis paperwediscuiss security problems insom'1e modern stream ciphers. Asweobserve somie tinmes that adesigner claims that thealgorithm designed is mnore secure butt whenitcomestoopenliteratuire we finda numberQfproblems. We discuss SNOW, Scream andRabbit. Someejforts havebeenmadeto overcome theproblems those werepointed outin these cryptosystems bvdifferent cryptanalysts. The stream ciphers arefaster andefficient thanblock ciphers butconmparatively less secure. Ouremphasis inthis paperistomak-e somecompromise on efficiency buttogetnmor-e security. IndexTerms- Streamciphers, Blockciphers, SNOW,Scream, Rabbit, chaotic.\",\"PeriodicalId\":222828,\"journal\":{\"name\":\"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-12-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICET.2005.1558887\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the IEEE Symposium on Emerging Technologies, 2005.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICET.2005.1558887","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}