Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Kennesaw State University

Theses/Dissertations

2020

Machine learning

Articles 1 - 1 of 1

Full-Text Articles in Computer Engineering

Rethinking The Weakness Of Stream Ciphers And Its Application To Encrypted Malware Detection, William T. Stone, Junggab Son Jul 2020

Rethinking The Weakness Of Stream Ciphers And Its Application To Encrypted Malware Detection, William T. Stone, Junggab Son

Master of Science in Computer Science Theses

Encryption key use is a critical component to the security of a stream cipher: because many implementations simply consist of a key scheduling algorithm and logical exclusive or (XOR), an attacker can completely break the cipher by XORing two ciphertexts encrypted under the same key, revealing the original plaintexts and the key itself. The research presented in this paper reinterprets this phenomenon, using repeated-key cryptanalysis for stream cipher identification. It has been found that a stream cipher executed under a fixed key generates patterns in each character of the ciphertexts it produces and that these patterns can be used to …