2020
DOI: 10.1109/access.2020.3030559
|View full text |Cite
|
Sign up to set email alerts
|

Rethinking the Weakness of Stream Ciphers and Its Application to Encrypted Malware Detection

Abstract: One critical vulnerability of stream ciphers is the reuse of an encryption key. Since most stream ciphers consist of only a key scheduling algorithm and an Exclusive OR (XOR) operation, an adversary may break the cipher by XORing two captured ciphertexts generated under the same key. Various cryptanalysis techniques based on this property have been introduced in order to recover plaintexts or encryption keys; in contrast, this research reinterprets the vulnerability as a method of detecting stream ciphers from… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…The encryption time for NCS and EHS is non-patterned, non-deterministic, and unpredictable because of the disintegration of the keys through the application of a Fixed Sliding Window Algorithm and XORing of the keys and the plaintext which makes NCS and EHS resistant to breaking the resultant cipher through XORing any captured encoded text [ 48 ]. Again the randomization from the application of the Sliding Window Algorithm helps to increase the security of the encrypted data and also reduces the time complexity of the Non-Deterministic Cryptographic Scheme [ 49 , 50 ].…”
Section: 0 Discussionmentioning
confidence: 99%
“…The encryption time for NCS and EHS is non-patterned, non-deterministic, and unpredictable because of the disintegration of the keys through the application of a Fixed Sliding Window Algorithm and XORing of the keys and the plaintext which makes NCS and EHS resistant to breaking the resultant cipher through XORing any captured encoded text [ 48 ]. Again the randomization from the application of the Sliding Window Algorithm helps to increase the security of the encrypted data and also reduces the time complexity of the Non-Deterministic Cryptographic Scheme [ 49 , 50 ].…”
Section: 0 Discussionmentioning
confidence: 99%
“…As such, exploring variant ciphers like EChacha20 strengthens the cryptographic defenses against emerging threats while guaranteeing long-term resiliency. • Weakness Mitigation in other ciphers: While to some extent the novel Chacha20 is considered to be robust, it is worth noting that other ciphers still exhibit some weaknesses and vulnerabilities [41]. Exploring EChacha20 is a step towards addressing some of these weaknesses by incorporating enhanced security features and strengthening the overall security posture.…”
Section: Preliminaries a Motivationmentioning
confidence: 99%