2022
DOI: 10.46586/tosc.v2022.i2.1-42
|View full text |Cite
|
Sign up to set email alerts
|

DRACO Stream Cipher

Abstract: Stream ciphers are vulnerable to generic time-memory-data tradeoff attacks. These attacks reduce the security level to half of the cipher’s internal state size. The conventional way to handle this vulnerability is to design the cipher with an internal state twice as large as the desired security level. In lightweight cryptography and heavily resource constrained devices, a large internal state size is a big drawback for the cipher. This design principle can be found in the eSTREAM portfolio members Grain and T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 36 publications
0
1
0
Order By: Relevance
“…A sufficient level of confusion and diffusion of the initial state bits is often achieved by the initialization process (Key/IV configuration). A common method of initialization is to repeatedly clock the Keystream Generator without creating keystream bits [18].…”
Section: E Design Criteria: Key/iv Setupmentioning
confidence: 99%
“…A sufficient level of confusion and diffusion of the initial state bits is often achieved by the initialization process (Key/IV configuration). A common method of initialization is to repeatedly clock the Keystream Generator without creating keystream bits [18].…”
Section: E Design Criteria: Key/iv Setupmentioning
confidence: 99%
“…Quantum security won't work in a situation where lowering the energy consumption of WSNs is a top concern (Vazirani & Vidick, 2019). (Hamann et al, 2022) suggested a security framework for three-party verification and distribution of keys using the Longer CK gateway of the 802.11i specification broadcast frame. The suggested approach, however, did not outline the proper definition for the access point's sessions identifier (SID).…”
Section: Introductionmentioning
confidence: 99%