Have a personal or library account? Click to login
Tabu Cryptanalysis of VMPC Stream Cipher Cover
By: Iwona Polak and  Mariusz Boryczka  
Open Access
|Aug 2019

References

  1. [1] ANTAL, E.—ELIÁŠ, M.: Evolutionary computation in cryptanalysis of classical ciphers, Tatra Mt. Math. Publ. 70 (2017), 179–197.10.1515/tmmp-2017-0026
  2. [2] BHATEJA, A. K.—BHATEJA, A.—CHAUDHURY, S.—SAXENA, P. K.: Cryptanalysis of Vigenère cipher using Cuckoo search, Appl. Soft Comput. 26 (2015), 315–324.10.1016/j.asoc.2014.10.004
  3. [3] DWORAK, K.—BORYCZKA, U.: Genetic algorithm as optimization tool for differential cryptanalysis of DES6. In: Computational Collective Intelligence: 9th International Conference, ICCCI 2017, Nicosia, Cyprus, September 27-29, 2017, Proceedings, Part II. Springer International Publishing, 2017, pp.107–116.10.1007/978-3-319-67077-5_11
  4. [4] GLOVER, F.: Tabu search — Part I, ORSA Journal on Computing, 1 (1989), no. 3, 190–206.10.1287/ijoc.1.3.190
  5. [5] HARRIS, B.: Improved Arcfour Modes for the Secure Shell (SSH) Transport Layer Protocol, Networking Working Group—Request for Comments: 4345, 2006.10.17487/rfc4345
  6. [6] LASKARI, E. C.—MELETIOU, G. C.—STAMATIOU, Y. C.—VRAHATIS, M. N.: Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers, Appl. Math. Comput. 184, (2007), no. 1, 63–72.10.1016/j.amc.2005.11.176
  7. [7] LI, S.—HU, Y.—ZHAO, Y.—WANG, Y.: Improved cryptanalysis of the VMPC stream cipher, J. Comput. Inform. Syst. 8 (2012), no. 2, 831–838.
  8. [8] MAXIMOV, A.: Two linear distinguishing attacks on VMPC and RC4A and weakness of RC4 family of stream ciphers. In: Lecture Notes in Comput. Sci. Vol. 3557, Springer-Verlag, 2005, pp.342–358,10.1007/11502760_23
  9. [9] POLAK, I.—BORYCZKA, M.: Tabu search against permutation based stream ciphers, International Journal of Electronics and Telecommunications, 64 (2018), no. 2, 137–145.10.24425/119361
  10. [10] RIVEST, R. L.—SCHULDT, J. C. N.: Spritz—A spongy RC4-like stream cipher and hash function. In: Presented at Charles River Crypto Day, 2014; https://people.csail.mit.edu/rivest/pubs/RS14.pdf
  11. [11] SARKAR, S.: Further non-randomness in RC4, RC4A and VMPC, Cryptogr. Commun. 7(2015), no. 3, 317–330.10.1007/s12095-014-0119-0
  12. [12] TSUNOO, Y.—SAITO, T.—KUBO, H.—SHIGERI, M.—SUZAKI, T.—KAWABATA, T.: The Most Efficient Distinguishing Attack on VMPC and RC4A, 2005; https://pdfs.semanticscholar.org/86a6/d5bdce46c112ece81982eb189d598e4b0414.pdf
  13. [13] ŻÓŁTAK, B. VMPC One-Way Function and Stream Cipher.In: Fast Software Encryption.In: Lecture Notes in Comput. Sci. Vol. 3017, 2004, pp. 210–225.10.1007/978-3-540-25937-4_14
DOI: https://doi.org/10.2478/tmmp-2019-0011 | Journal eISSN: 1338-9750 | Journal ISSN: 12103195
Language: English
Page range: 145 - 162
Submitted on: Aug 31, 2018
Published on: Aug 15, 2019
Published by: Slovak Academy of Sciences, Mathematical Institute
In partnership with: Paradigm Publishing Services
Publication frequency: 3 issues per year

© 2019 Iwona Polak, Mariusz Boryczka, published by Slovak Academy of Sciences, Mathematical Institute
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.