Paper Title:
A New Adaptive SSC and SSSC Stream Cipher Model Design and Implementation
  Abstract

To solve the problem of construction for stream cipher key generator and the problem of SSC/SSSC stream ciphers need to relay on the secret channel to transmit the key, it presents a new clock function drive by a clock-control sequence and chaotic cascade function made of multiple Logistic function , which are used to built the self-reference model and chaotic module; it design a adapt controller independent of the key generator and encrypt module, achieve controlling encryption and transmission process by multi-threaded code;it makes a key generator with transformation ranks and wheel key method of AES and S-box of Camellia, which makes the sub-key and the key generator`s internal station become a insufficient condition that does not need to depend on the secret channel, the model achieves a exponential growth in the key space and the same application scope of traditional SSC and SSSC model. The new protocol model features can be seen under the actual operation of modifying RC4 algorithm.

  Info
Periodical
Advanced Materials Research (Volumes 143-144)
Edited by
H. Wang, B.J. Zhang, X.Z. Liu, D.Z. Luo, S.B. Zhong
Pages
298-302
DOI
10.4028/www.scientific.net/AMR.143-144.298
Citation
L. Z. Liu, X. J. Hu, T. H. Zhang, Y. Wang, M. Q. Li, "A New Adaptive SSC and SSSC Stream Cipher Model Design and Implementation", Advanced Materials Research, Vols. 143-144, pp. 298-302, 2011
Online since
October 2010
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Jia Liu, Yu Li Shen
Chapter 6: Communication and Network
Abstract:In this paper, a wireless local area network (WLAN) authentication scheme is proposed to both enhance the security and the working efficiency...
1113
Authors: Arum Sulgi Cho, Xiao Wei Li, Sung Jin Cho, Seok Tae Kim
Chapter 5: Advanced Development for Information Technologies and Engineering, Networks and Software Applications, Data Acquisition and Processing, Intelligent Systems
Abstract:In this paper, we propose a video image encryption approach by using maximum length cellular automata (MLCA) methods. First, the plane images...
992
Authors: Tao Song
Chapter 8: Data, Signal and Image Processing, Applied Computational Technologies
Abstract:In recent years, chaos-based image encryption technologies have been widely studied to meet the increasing demand for real-time secure image...
1030