Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Cryptography: Theory and Practice,Second Edition
Cryptography: Theory and Practice,Second Edition
Foundations of Cryptography: Basic Tools
Foundations of Cryptography: Basic Tools
Weaknesses in the Key Scheduling Algorithm of RC4
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP)
ACM Transactions on Information and System Security (TISSEC)
Hi-index | 0.00 |
A stream cipher namely the HSC (Hashing Stream Cipher) which uses a regular one-way hash function to generate pseudorandom keystream iteratively is proposed. Since the timestamp is used in the keystream generator, the algorithm achieves the robustness against the adaptive-chosen-plaintext attack. The one-way hash function is the core of the algorithm, so the security analysis of the algorithm is shifted to that of the hash function. If the core one-way hash function is chosen properly, it can be asserted that there would be no period in the HSC keystream. Firstly the algorithm was introduced detailedly. Then its applying security and efficiency respectively discussed deeply. The experimental result shows that the algorithm has both a high security and good efficiency.