Stream Cipher

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 6768 Experts worldwide ranked by ideXlab platform

Osamu Hirota - One of the best experts on this subject based on the ideXlab platform.

  • quantum Stream Cipher beyond the shannon limit of symmetric key Cipher and the possibility of experimental demonstration
    Proceedings of SPIE, 2010
    Co-Authors: Osamu Hirota, Masaki Sohma, T Iwakoshi, Fumio Futami
    Abstract:

    The security in the next generation optical network which realizes "Cloud Computing System Service with data center" is one of the most important problems. In such a network, the encryption in physical layer which provide super security and small delay is a preferable. It has to be applicable, however, to very high speed data because the basic link is operated at 2.5 Gbit/sec ~ 10 Gbit/sec. The quantum Stream Cipher by Yuen-2000 protocol (Y00) is a completely new type of random Cipher, which can exceed the Shannon limit of the symmetric key Cipher. This paper extends some theoretical results on the security for quantum Stream Cipher such as Y00 protocol and generalized Y00. First, the conditions to exceed the Shannon limit are summarized. We formulate a generalized secret capacity in the sense of wire tap channel supported by secret key to clarify a Cipher exceeding the Shannon limit. The generalized secret capacities for space communication and fiber communication based on the generalized Y00 are given. When the relaxation of physical constraint or device limit of the eavesdropper is allowed, we point out that a Cipher scheme exceeding the Shannon limit can be realized only by the conventional optical system.

  • running key mapping in a quantum Stream Cipher by the yuen 2000 protocol
    Physical Review A, 2008
    Co-Authors: Tetsuya Shimizu, Osamu Hirota, Yuki Nagasako
    Abstract:

    A quantum Stream Cipher by Yuen 2000 protocol (so-called Y00 protocol or $\ensuremath{\alpha}\ensuremath{\eta}$ scheme) consisting of linear feedback shift register of short key is very attractive in implementing secure 40 Gbits/s optical data transmission, which is expected as a next-generation network. However, a basic model of the Y00 protocol with a very short key needs a careful design against fast correlation attacks as pointed out by Donnet et al. This Brief Report clarifies an effectiveness of irregular mapping between running key and physical signals in the driver for selection of $M$-ary basis in the transmitter, and gives a design method. Consequently, quantum Stream Cipher by the Y00 protocol with our mapping has immunity against the proposed fast correlation attacks on a basic model of the Y00 protocol even if the key is very short.

  • Immunity against Correlation Attack on Quantum Stream Cipher by Yuen 2000 Protocol
    Quantum Information Processing, 2007
    Co-Authors: Osamu Hirota, Kaoru Kurosawa
    Abstract:

    This paper presents the security analysis on the quantum Stream Cipher so called Yuen-2000 protocol (or αη scheme) against the fast correlation attack, the typical attack on Stream Ciphers. Although the security of a very simple experimental model of the quantum Stream Cipher without a randomization may be reduced to a complexity based security against the correlation attacks under a large number of known plaintexts, it is not a basic feature of Yuen 2000 protocol. In fact, we clarify that there exists a randomization scheme which attains the perfect correlation immunity against such attacks under an approximation. And in this scheme, the running key correlation from the second randomization that determines the mapping patterns is broken off also by quantum noise. In such a case, any fast correlation attack does not work on the quantum Stream Cipher.

  • quantum Stream Cipher by the yuen 2000 protocol design and experiment by an intensity modulation scheme
    Physical Review A, 2005
    Co-Authors: Osamu Hirota, Masaki Sohma, Masaru Fuse, Kentaro Kato
    Abstract:

    We investigate the Yuen 2000 (so-called Y-00)-protocol, which can realize a randomized Stream Cipher with high bit rate (Gbit/s) for long distances (several hundreds km). The randomized Stream Cipher with randomization by quantum noise based on the Y-00 protocol is called a quantum Stream Cipher in this paper, and it may have security against known plaintext attacks which has no analog with any conventional symmetric key Ciphers. We present a simple cryptanalysis based on an attacker's heterodyne measurement and a quantum unambiguous measurement to make clear the strength of the Y-00 protocol in real communication. In addition, we give a design for the implementation of an intensity-modulation scheme and report an experimental demonstration of 1 Gbit/s quantum Stream Cipher through a 20-km-long transmission line.

  • quantum Stream Cipher by the yuen 2000 protocol design and experiment by an intensity modulation scheme
    Physical Review A, 2005
    Co-Authors: Osamu Hirota, Masaki Sohma, Masaru Fuse, Kentaro Kato
    Abstract:

    We investigate the Yuen 2000 (so-called Y-00)-protocol, which can realize a randomized Stream Cipher with high bit rate (Gbit/s) for long distances (several hundreds km). The randomized Stream Cipher with randomization by quantum noise based on the Y-00 protocol is called a quantum Stream Cipher in this paper, and it may have security against known plaintext attacks which has no analog with any conventional symmetric key Ciphers. We present a simple cryptanalysis based on an attacker's heterodyne measurement and a quantum unambiguous measurement to make clear the strength of the Y-00 protocol in real communication. In addition, we give a design for the implementation of an intensity-modulation scheme and report an experimental demonstration of $1\phantom{\rule{0.3em}{0ex}}\mathrm{Gbit}∕\mathrm{s}$ quantum Stream Cipher through a $20\text{\ensuremath{-}}\mathrm{km}$-long transmission line.

Jens Bornemann - One of the best experts on this subject based on the ideXlab platform.

  • Reconfigurable Feedback Shift Register Based Stream Cipher for Wireless Sensor Networks
    2016
    Co-Authors: Guang Zeng, Xiaodai Dong, Senior Member, Jens Bornemann
    Abstract:

    Abstract—Secure wireless communications among sensor nodes is critical to the deployment of wireless sensor net-works. However, resource limited sensor nodes cannot afford complex cryptographic algorithms. In this letter, we propose a low complexity and energy efficient reconfigurable feedback shift register (RFSR) Stream Cipher. The RFSR adds one new dimension, reconfigurable Cipher structure, to the existing Stream Ciphers. The proposed RFSR is then implemented on a field programmable gate array platform. Simulation results show that much lower power consumption, delay and transmission overhead are achieved compared to the existing microprocessor based Cipher implementations. Index Terms—Stream Cipher, wireless sensor network, energy efficient Cipher, feedback shift register. I

  • reconfigurable feedback shift register based Stream Cipher for wireless sensor networks
    IEEE Wireless Communications Letters, 2013
    Co-Authors: Guang Zeng, Xiaodai Dong, Jens Bornemann
    Abstract:

    Secure wireless communications among sensor nodes is critical to the deployment of wireless sensor networks. However, resource limited sensor nodes cannot afford complex cryptographic algorithms. In this letter, we propose a low complexity and energy efficient reconfigurable feedback shift register (RFSR) Stream Cipher. The RFSR adds one new dimension, reconfigurable Cipher structure, to the existing Stream Ciphers. The proposed RFSR is then implemented on a field programmable gate array platform. Simulation results show that much lower power consumption, delay and transmission overhead are achieved compared to the existing microprocessor based Cipher implementations.

Kentaro Kato - One of the best experts on this subject based on the ideXlab platform.

  • quantum Stream Cipher by the yuen 2000 protocol design and experiment by an intensity modulation scheme
    Physical Review A, 2005
    Co-Authors: Osamu Hirota, Masaki Sohma, Masaru Fuse, Kentaro Kato
    Abstract:

    We investigate the Yuen 2000 (so-called Y-00)-protocol, which can realize a randomized Stream Cipher with high bit rate (Gbit/s) for long distances (several hundreds km). The randomized Stream Cipher with randomization by quantum noise based on the Y-00 protocol is called a quantum Stream Cipher in this paper, and it may have security against known plaintext attacks which has no analog with any conventional symmetric key Ciphers. We present a simple cryptanalysis based on an attacker's heterodyne measurement and a quantum unambiguous measurement to make clear the strength of the Y-00 protocol in real communication. In addition, we give a design for the implementation of an intensity-modulation scheme and report an experimental demonstration of 1 Gbit/s quantum Stream Cipher through a 20-km-long transmission line.

  • quantum Stream Cipher by the yuen 2000 protocol design and experiment by an intensity modulation scheme
    Physical Review A, 2005
    Co-Authors: Osamu Hirota, Masaki Sohma, Masaru Fuse, Kentaro Kato
    Abstract:

    We investigate the Yuen 2000 (so-called Y-00)-protocol, which can realize a randomized Stream Cipher with high bit rate (Gbit/s) for long distances (several hundreds km). The randomized Stream Cipher with randomization by quantum noise based on the Y-00 protocol is called a quantum Stream Cipher in this paper, and it may have security against known plaintext attacks which has no analog with any conventional symmetric key Ciphers. We present a simple cryptanalysis based on an attacker's heterodyne measurement and a quantum unambiguous measurement to make clear the strength of the Y-00 protocol in real communication. In addition, we give a design for the implementation of an intensity-modulation scheme and report an experimental demonstration of $1\phantom{\rule{0.3em}{0ex}}\mathrm{Gbit}∕\mathrm{s}$ quantum Stream Cipher through a $20\text{\ensuremath{-}}\mathrm{km}$-long transmission line.

Guang Zeng - One of the best experts on this subject based on the ideXlab platform.

  • Reconfigurable Feedback Shift Register Based Stream Cipher for Wireless Sensor Networks
    2016
    Co-Authors: Guang Zeng, Xiaodai Dong, Senior Member, Jens Bornemann
    Abstract:

    Abstract—Secure wireless communications among sensor nodes is critical to the deployment of wireless sensor net-works. However, resource limited sensor nodes cannot afford complex cryptographic algorithms. In this letter, we propose a low complexity and energy efficient reconfigurable feedback shift register (RFSR) Stream Cipher. The RFSR adds one new dimension, reconfigurable Cipher structure, to the existing Stream Ciphers. The proposed RFSR is then implemented on a field programmable gate array platform. Simulation results show that much lower power consumption, delay and transmission overhead are achieved compared to the existing microprocessor based Cipher implementations. Index Terms—Stream Cipher, wireless sensor network, energy efficient Cipher, feedback shift register. I

  • reconfigurable feedback shift register based Stream Cipher for wireless sensor networks
    IEEE Wireless Communications Letters, 2013
    Co-Authors: Guang Zeng, Xiaodai Dong, Jens Bornemann
    Abstract:

    Secure wireless communications among sensor nodes is critical to the deployment of wireless sensor networks. However, resource limited sensor nodes cannot afford complex cryptographic algorithms. In this letter, we propose a low complexity and energy efficient reconfigurable feedback shift register (RFSR) Stream Cipher. The RFSR adds one new dimension, reconfigurable Cipher structure, to the existing Stream Ciphers. The proposed RFSR is then implemented on a field programmable gate array platform. Simulation results show that much lower power consumption, delay and transmission overhead are achieved compared to the existing microprocessor based Cipher implementations.

Fadira Akmal - One of the best experts on this subject based on the ideXlab platform.

  • dragon Stream Cipher for secure blackbox cockpit voice recorder
    Microelectronics Systems Education, 2017
    Co-Authors: Fadira Akmal, Surya Michrandi Nasution, Fairuz Azmi
    Abstract:

    Aircraft blackbox is a device used to record all aircraft information, which consists of Flight Data Recorder (FDR) and Cockpit Voice Recorder (CVR). Cockpit Voice Recorder contains conversations in the aircraft during the flight.Investigations on aircraft crashes usually take a long time, because it is difficult to find the aircraft blackbox. Then blackbox should have the ability to send information to other places. Aircraft blackbox must have a data security system, data security is a very important part at the time of information exchange process. The system in this research is to perform the encryption and decryption process on Cockpit Voice Recorder by people who are entitled by using Dragon Stream Cipher algorithm. The tests performed are time of data encryption and decryption, and avalanche effect. Result in this paper show us time encryption and decryption are 0,85 seconds and 1,84 second for 30 seconds Cockpit Voice Recorder data witn an avalanche effect 48,67 %.

  • IMPLEMENTASI DAN ANALISIS PERBANDINGAN ALGORITMA Stream Cipher UNTUK SECURE BLACKBOX COCKPIT VOICE RECORDER
    Universitas Telkom, 2017
    Co-Authors: Fadira Akmal
    Abstract:

    Sistem yang ada pada black box pesawat saat ini hanya sebatas sebagai media penyimpan segala bentuk aktivitas penerbangan. Black box pesawat belum memiliki kemampuan untuk mengirimkan informasi ke tempat lain serta jika ada proses pengiriman informasi, black box pesawat belum memiliki sistem keamanan. Keamanan data merupakan bagian yang sangat penting pada saat melakukan proses pertukaran informasi. Informasi yang dipertukarkan hanya boleh diketahui dan dimiliki oleh pengirim dan penerima yang telah ditentukan. Proses pertukaran tidak boleh melibatkan man-in-the-middle attacker atau pihak yang tidak dikenali oleh pengirim atau penerima. Oleh karena itu untuk menjaga keamanan, kerahasian dan autentikasi data perlu adanya implementasi kriptografi, yang merupakan ilmu dan seni untuk menjaga keamanan pesan. Algoritma Stream Cipher yang digunakan adalah Dragon yang termasuk ke dalam kategori synchronous Stream Cipher dalam proses enkripsi dan dekripsi. Dragon merupakan algoritma kandidat eStream Project, yang dapat diimplementasikan pada software dan hardware. Pada penelitian Tugas Akhir ini, dirancang suatu sistem pengamanan data suara pada cockpit voice recorder, dengan cara dienkripsi. Lalu memberikan hak akses secara aman untuk didekripsi oleh orang yang memiliki hak akses data tersebut. Hasil akhir yang didapat dari penelitian ini akan di uji performansi terkait waktu proses enkripsi dan dekripsi, avalanche effect, dan keutuhan data. Sehingga didapatkan satu algoritma yang memiliki sistem keamanan yang layak untuk cockpit voice recorder. Keyword : Stream Cipher, dragon, cockpit voice recorde