Rethinking the Weakness of Stream Ciphers and Its Application to Encrypted Malware Detection

One critical vulnerability of stream ciphers is the reuse of an encryption key. Since most stream ciphers consist of only a key scheduling algorithm and an Exclusive OR (XOR) operation, an adversary may break the cipher by XORing two captured ciphertexts generated under the same key. Various cryptan...

Full description

Bibliographic Details
Main Authors: William Stone, Daeyoung Kim, Victor Youdom Kemmoe, Mingon Kang, Junggab Son
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9222070/