Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 1 of 1
Full-Text Articles in Computer Engineering
Rethinking The Weakness Of Stream Ciphers And Its Application To Encrypted Malware Detection, William T. Stone, Junggab Son
Rethinking The Weakness Of Stream Ciphers And Its Application To Encrypted Malware Detection, William T. Stone, Junggab Son
Master of Science in Computer Science Theses
Encryption key use is a critical component to the security of a stream cipher: because many implementations simply consist of a key scheduling algorithm and logical exclusive or (XOR), an attacker can completely break the cipher by XORing two ciphertexts encrypted under the same key, revealing the original plaintexts and the key itself. The research presented in this paper reinterprets this phenomenon, using repeated-key cryptanalysis for stream cipher identification. It has been found that a stream cipher executed under a fixed key generates patterns in each character of the ciphertexts it produces and that these patterns can be used to …