Show simple item record

dc.contributor.advisorStanica, Pantelimon
dc.contributor.advisorBassett, Robert L.
dc.contributor.authorZillmer, Devon
dc.date.accessioned2021-08-27T01:38:30Z
dc.date.available2021-08-27T01:38:30Z
dc.date.issued2021-06
dc.identifier.urihttps://hdl.handle.net/10945/67841
dc.description.abstractEncryption is ubiquitous in the modern environment. While public/private key architecture has provided an amazing and powerful way to encrypt information so that only one intended recipient can decrypt, the computation required for this approach means that this encryption method can quickly grow extremely expensive. With that in mind, there are a variety of open-source stream ciphers that seek to provide relatively inexpensive stream ciphers to securely encrypt information. But these stream ciphers all operate using very different techniques to generate their keystream, as seen in the stark differences in paradigms between ciphers. As such, it is not immediately clear what operations are required to achieve the desired level of encryption. What cryptographic primitives are most common or efficacious in achieving security? Examining the Data Encryption Standard, Advanced Encryption Standard, and the stream cipher winners of the eStream II competition, an underlying trend composed of two operations emerges. Despite observing no clear n-grams defining precise cryptographic primitives, we identify a general structure common to all stream ciphers. Additionally, we identify that substitution boxes or multiplication operations are not necessary for stream ciphers, whereas addition and rotation operations seem to be essential.en_US
dc.publisherMonterey, CA; Naval Postgraduate Schoolen_US
dc.rightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.en_US
dc.titleA STATISTICAL ANALYSIS OF SOME STANDARD CIPHERS’ CRYPTOGRAPHIC PRIMITIVESen_US
dc.typeThesisen_US
dc.contributor.secondreaderMartinsen, Thor
dc.contributor.departmentApplied Mathematics (MA), Operations Research (OR)
dc.subject.authorcryptographyen_US
dc.subject.authorcipheren_US
dc.subject.authoralgebraen_US
dc.subject.authoreStreamen_US
dc.description.serviceMajor, United States Armyen_US
etd.thesisdegree.nameMaster of Science in Applied Mathematics, Master of Science in Operations Researchen_US
etd.thesisdegree.levelMasters, Mastersen_US
etd.thesisdegree.disciplineApplied Mathematics, Operations Researchen_US
etd.thesisdegree.grantorNaval Postgraduate Schoolen_US
dc.identifier.thesisid36361
dc.description.distributionstatementApproved for public release. Distribution is unlimited.en_US
dc.identifier.curriculumcode380, Applied Mathematics, 360, Operations Analysis


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record