research centers


Search results: Found 4

Listing 1 - 4 of 4
Sort by

Article
The Frequency Theoretic Estimation of non-Linear Key Generator Sequences

Authors: Abdul Monem S. Rahma --- Shatha A. Salman --- Ayad G. Nasser
Journal: Engineering and Technology Journal مجلة الهندسة والتكنولوجيا ISSN: 16816900 24120758 Year: 2011 Volume: 29 Issue: 7 Pages: 1241-1250
Publisher: University of Technology الجامعة التكنولوجية

Loading...
Loading...
Abstract

The Randomness is one of the basic criterions to measure Key GeneratorEfficiency. The key generator depends basically on Linear FeedBack ShiftRegister which is considered as one of the basic units of Stream Cipher Systems.In this paper, the frequency postulate of Randomness criteria is calculatedtheoretically for non-linear key generator before it be implemented or constructed(software or hardware), this procedure save time and costs. Two non-linear keygenerators are chosen to apply the theoretical studies; these key generators are theProduct and Brüer.


Article
Attacking of stream Cipher Systems Using a Genetic Algorithm

Journal: Univesity of Thi-Qar Journal مجلة جامعة ذي قار العلمية ISSN: 66291818 Year: 2011 Volume: 6 Issue: 3 Pages: 1-6
Publisher: Thi-Qar University جامعة ذي قار

Loading...
Loading...
Abstract


Article
Cryptanalysis of Stream Cipher System Using Particle Swarm Optimization Algorithm

Author: Hussein Ali Mohammed Al_Sharifi
Journal: journal of kerbala university مجلة جامعة كربلاء ISSN: 18130410 Year: 2010 Volume: 8 Issue: 4 Pages: 384-394
Publisher: Kerbala University جامعة كربلاء

Loading...
Loading...
Abstract

The meaning of the Particle Swarm Optimization (PSO) refers to a relatively new family of algorithms that may be used to find optimal (or near optimal) solutions to numerical and qualitative problems.Stream ciphers are an important class of encryption algorithms. Shift register sequences are used in both cryptography and coding theory. There is a wealth of theory about them; stream ciphers based on shift registers have been the workhorse of military cryptography since the beginnings of electronics.This paper aims to implement cryptanalysis attack algorithms on stream cipher systems using plaintext attack (or part from it), choosing one Linear Feedback Shift Register (LFSR), since its considered as a basic unit of stream cipher systems, in the performance of PSO by solving Linear Equations System (LES) for any number of variables of the output of LFSR.The application divided into two stages, first, constructing LES’s for the LFSR, and the second, is attacking the variables of LES’s which they are also the initial key values the of LFSR.

أن تحقيق أمثلية السرب الجزيئي(PSO) Particle Swarm Optimization تعني الآشارة الى عائلة جديدة من الخوارزميات التي تستخدم لايجاد حلول مثالية (أو أقرب الى المثالية) للمسائل العددية والكمية.يعتبر التشفير الانسيابي Stream Cipher عائلة مهمة من خوارزميات التشفير. لقد استخدمت المتتابعات المولدة من المسجل الزاحف Shift Register Sequences في نظم التشفير ونظرية المعلومات، حيث توجد نظريات كثيرة بصددهم. ان لنظم التشفير الانسيابي التي تعتمد على المسجل الزاحف لها الدور الكبير في نظم التشفير وخصوصا العسكرية منها.هدف هذا البحث تنفيذ خوارزمية تحليل الشفرة (Cryptanalysis) على انظمة التشفير الانسيابي باختيار مسجل زاحف خطي ذو تغذية مرتدة، باعتباره الوحدة الأساسية التي تدخل في بناء نظم التشفير الانسيابي، معتمدين على انجاز خوارزمية أمثلية السرب الجزيئي من خلال حل نظم المعادلات الخطية لأي عدد من المتغيرات التي تمثل مخرجات المسجل الزاحف.التطبيق في هذا البحث يتم في مرحلتين، الأولى تتمثل ببناء نظام معادلات خطية من مخرجات المسجل الزاحف، والمرحلة الثانية هي حل نظام المعادلات الخطية ومعرفة قيم المجاهيل والتي تمثل قيم المفتاح الابتدائي للمسجل الزاحف.


Article
Analyzing Cryptosystems by Using Artificial Intelligence

Authors: Ahmed Ayyoub Yousif --- Mohammed G. S. Al-Safi --- Faez Hassan Ali
Journal: Al-Nahrain Journal of Science مجلة النهرين للعلوم ISSN: (print)26635453,(online)26635461 Year: 2018 Volume: 00 Issue: 1 Pages: 100-108
Publisher: Al-Nahrain University جامعة النهرين

Loading...
Loading...
Abstract

This paper aims to apply the Bees Algorithm for solving system of equations. The solving System of Equations may be linear or nonlinear for a number of unknowns. As an application of System of Equations, we can implement cryptanalysis attack algorithms on stream cipher systems using plaintext attack (or part from it). We consider the Geffe System (which has nonlinear combining function) to be our study case, which is depend on set of Linear Feedback Shift Registers, as a model of stream cipher systems, in the performance of Bees Algorithm by solving System of Equations for any number of variables of the output of Linear Feedback Shift Registers.The application divided into two stages, first, constructing System of Equations for the suggested cryptosystem, and the second, is attacking the variables of System of Equations which they are also represent the initial key values of the combined of Linear Feedback Shift Registers.

Listing 1 - 4 of 4
Sort by
Narrow your search

Resource type

article (4)


Language

English (4)


Year
From To Submit

2018 (1)

2011 (2)

2010 (1)