2011
DOI: 10.1007/978-3-642-24586-2_15
|View full text |Cite
|
Sign up to set email alerts
|

Generalized Avalanche Test for Stream Cipher Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…For both cases, Z = Y ⊕ Y . If an algorithm does not exhibit sufficient Avalanche Effect compliance it would be extremely vulnerable to chosen-plaintext attacks, so this kind of analysis is regarded as a conventional test ran to evaluate cryptographic algorithms' strength [Ramanujam and Karuppiah (2011); Mishra et al (2011); Nadu (2018)]. The method presented in Section 3 was tested according to the specifications listed in 6.2.1 and 6.2.2.…”
Section: Avalanche Effectmentioning
confidence: 99%
“…For both cases, Z = Y ⊕ Y . If an algorithm does not exhibit sufficient Avalanche Effect compliance it would be extremely vulnerable to chosen-plaintext attacks, so this kind of analysis is regarded as a conventional test ran to evaluate cryptographic algorithms' strength [Ramanujam and Karuppiah (2011); Mishra et al (2011); Nadu (2018)]. The method presented in Section 3 was tested according to the specifications listed in 6.2.1 and 6.2.2.…”
Section: Avalanche Effectmentioning
confidence: 99%
“…These two criteria measure different characteristics of the change's effect that an input bit has on the output bits; while the SAC verifies uniformity in the distribution of each output bit, the BIC measures the degree of independence between the output bits [15]. The SAC has been extended to be applied to stream ciphers [16][17][18][19][20][21][22]. In [22], the RC4 stream cipher [23] was evaluated through the SAC and the existence of statistical dependence between the input bits and outputs of the RC4 was detected for inputs of large size.…”
Section: Introductionmentioning
confidence: 99%
“…Both the key and IV bits should meet the key avalanche criteria, i.e., for any keys and IVs, the sequences generated should be drastically different 72 and the possibility of related keys or equivalent keys should not occur. According to avalanche criteria, a small change in input bits to the cipher system should make a drastic change (50% dissimilarity) randomly in the output key sequence bits.…”
mentioning
confidence: 99%