<p>In recent times, each user needs to secure the information from unwanted disclosure of secret. Encryption is the most wildly used technique to secure the information. LFSR based cipher systems called stream ciphers are commonly used for applications which requires high speed encryption and implementation. Even though these systems provide secrecy to information stream ciphers are highly vulnerable to attacks. The securities of these systems are calculated mostly in terms of correlation attacks and algebraic attacks. In these attacks the key is found by solving this multivariable system of equations. This paper presents a careful analysis on Stream Cipher TRIVIUM. The study has been performed on how the equations are generated and how much they are vulnerable to various attacks. Finally a minor variation has been made on TRIVIUM to prevent algebraic attack by guessing apposite nonlinear variables. Here propose a new design to the key generation of Trivium that has better correlation properties.</p>
cited By (since 1996)0; Conference of org.apache.xalan.xsltc.dom.DOMAdapter@792f1f1f ; Conference Date: org.apache.xalan.xsltc.dom.DOMAdapter@4a46a61 Through org.apache.xalan.xsltc.dom.DOMAdapter@464408a8; Conference Code:85619
A. S. Raj and Dr. Srinivasan C., “Analysis of Algebraic Attack on TRIVIUM and Minute Modification to TRIVIUM”, in Advances in Network Security and Applications: 4th International Conference, CNSA 2011, Chennai, India, July 15-17, 2011, D. C. Wyld, Wozniak, M., Chaki, N., Meghanathan, N., and Nagamalai, D., Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011, pp. 35–42.