Tabu Search Against Permutation Based Stream Ciphers

Encryption is one of the most effective methods of securing data confidentiality, whether stored on hard drives or transferred (e.g. by e-mail or phone call). In this paper a new state recovery attack with tabu search is introduced. Based on research and theoretical approximation it is shown that th...

Full description

Bibliographic Details
Main Authors: Iwona Polak, Marcin Boryczka
Format: Article
Language:English
Published: Polish Academy of Sciences 2018-05-01
Series:International Journal of Electronics and Telecommunications
Subjects:
Online Access:https://journals.pan.pl/Content/103842/PDF/20_1157-4308-1-PB.pdf
_version_ 1811343598077083648
author Iwona Polak
Marcin Boryczka
author_facet Iwona Polak
Marcin Boryczka
author_sort Iwona Polak
collection DOAJ
description Encryption is one of the most effective methods of securing data confidentiality, whether stored on hard drives or transferred (e.g. by e-mail or phone call). In this paper a new state recovery attack with tabu search is introduced. Based on research and theoretical approximation it is shown that the internal state can be recovered after checking 252 internal states for RC4 and 2180 for VMPC.
first_indexed 2024-04-13T19:32:47Z
format Article
id doaj.art-e6de61c58e2c4d4491e8e6751e3b385c
institution Directory Open Access Journal
issn 2081-8491
2300-1933
language English
last_indexed 2024-04-13T19:32:47Z
publishDate 2018-05-01
publisher Polish Academy of Sciences
record_format Article
series International Journal of Electronics and Telecommunications
spelling doaj.art-e6de61c58e2c4d4491e8e6751e3b385c2022-12-22T02:33:09ZengPolish Academy of SciencesInternational Journal of Electronics and Telecommunications2081-84912300-19332018-05-01vol. 64No 2https://doi.org/10.24425/119361Tabu Search Against Permutation Based Stream CiphersIwona PolakMarcin BoryczkaEncryption is one of the most effective methods of securing data confidentiality, whether stored on hard drives or transferred (e.g. by e-mail or phone call). In this paper a new state recovery attack with tabu search is introduced. Based on research and theoretical approximation it is shown that the internal state can be recovered after checking 252 internal states for RC4 and 2180 for VMPC.https://journals.pan.pl/Content/103842/PDF/20_1157-4308-1-PB.pdftabu searchtscryptanalysisrc4vmpcstream cipherstate recovery attack
spellingShingle Iwona Polak
Marcin Boryczka
Tabu Search Against Permutation Based Stream Ciphers
International Journal of Electronics and Telecommunications
tabu search
ts
cryptanalysis
rc4
vmpc
stream cipher
state recovery attack
title Tabu Search Against Permutation Based Stream Ciphers
title_full Tabu Search Against Permutation Based Stream Ciphers
title_fullStr Tabu Search Against Permutation Based Stream Ciphers
title_full_unstemmed Tabu Search Against Permutation Based Stream Ciphers
title_short Tabu Search Against Permutation Based Stream Ciphers
title_sort tabu search against permutation based stream ciphers
topic tabu search
ts
cryptanalysis
rc4
vmpc
stream cipher
state recovery attack
url https://journals.pan.pl/Content/103842/PDF/20_1157-4308-1-PB.pdf
work_keys_str_mv AT iwonapolak tabusearchagainstpermutationbasedstreamciphers
AT marcinboryczka tabusearchagainstpermutationbasedstreamciphers