Tabu Search Against Permutation Based Stream Ciphers
Encryption is one of the most effective methods of securing data confidentiality, whether stored on hard drives or transferred (e.g. by e-mail or phone call). In this paper a new state recovery attack with tabu search is introduced. Based on research and theoretical approximation it is shown that th...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Polish Academy of Sciences
2018-05-01
|
Series: | International Journal of Electronics and Telecommunications |
Subjects: | |
Online Access: | https://journals.pan.pl/Content/103842/PDF/20_1157-4308-1-PB.pdf |
_version_ | 1811343598077083648 |
---|---|
author | Iwona Polak Marcin Boryczka |
author_facet | Iwona Polak Marcin Boryczka |
author_sort | Iwona Polak |
collection | DOAJ |
description | Encryption is one of the most effective methods of securing data confidentiality, whether stored on hard drives or transferred (e.g. by e-mail or phone call). In this paper a new state recovery attack with tabu search is introduced. Based on research and theoretical approximation it is shown that the internal state can be recovered after checking 252 internal states for RC4 and 2180 for VMPC. |
first_indexed | 2024-04-13T19:32:47Z |
format | Article |
id | doaj.art-e6de61c58e2c4d4491e8e6751e3b385c |
institution | Directory Open Access Journal |
issn | 2081-8491 2300-1933 |
language | English |
last_indexed | 2024-04-13T19:32:47Z |
publishDate | 2018-05-01 |
publisher | Polish Academy of Sciences |
record_format | Article |
series | International Journal of Electronics and Telecommunications |
spelling | doaj.art-e6de61c58e2c4d4491e8e6751e3b385c2022-12-22T02:33:09ZengPolish Academy of SciencesInternational Journal of Electronics and Telecommunications2081-84912300-19332018-05-01vol. 64No 2https://doi.org/10.24425/119361Tabu Search Against Permutation Based Stream CiphersIwona PolakMarcin BoryczkaEncryption is one of the most effective methods of securing data confidentiality, whether stored on hard drives or transferred (e.g. by e-mail or phone call). In this paper a new state recovery attack with tabu search is introduced. Based on research and theoretical approximation it is shown that the internal state can be recovered after checking 252 internal states for RC4 and 2180 for VMPC.https://journals.pan.pl/Content/103842/PDF/20_1157-4308-1-PB.pdftabu searchtscryptanalysisrc4vmpcstream cipherstate recovery attack |
spellingShingle | Iwona Polak Marcin Boryczka Tabu Search Against Permutation Based Stream Ciphers International Journal of Electronics and Telecommunications tabu search ts cryptanalysis rc4 vmpc stream cipher state recovery attack |
title | Tabu Search Against Permutation Based Stream Ciphers |
title_full | Tabu Search Against Permutation Based Stream Ciphers |
title_fullStr | Tabu Search Against Permutation Based Stream Ciphers |
title_full_unstemmed | Tabu Search Against Permutation Based Stream Ciphers |
title_short | Tabu Search Against Permutation Based Stream Ciphers |
title_sort | tabu search against permutation based stream ciphers |
topic | tabu search ts cryptanalysis rc4 vmpc stream cipher state recovery attack |
url | https://journals.pan.pl/Content/103842/PDF/20_1157-4308-1-PB.pdf |
work_keys_str_mv | AT iwonapolak tabusearchagainstpermutationbasedstreamciphers AT marcinboryczka tabusearchagainstpermutationbasedstreamciphers |