This site uses cookies. By continuing to use this site you agree to our use of cookies. To find out more, see our Privacy and Cookies policy.
Brought to you by:
Paper The following article is Open access

Security Evaluation for Stream Cipher Cryptosystem Based on Soft Computing and Theoretic Parameters

and

Published under licence by IOP Publishing Ltd
, , Citation S. R. Al-Shuwaili and K. H. Al-Ibraheemi 2021 J. Phys.: Conf. Ser. 1818 012210 DOI 10.1088/1742-6596/1818/1/012210

1742-6596/1818/1/012210

Abstract

Security evaluation means an examination of a system to determine its degree of compliance with a stated security model, security standard, or specification. There are different models for security assessment, and the operation of selecting the appropriate model depends on the type of the cryptosystem. Consequently, the criteria for assessing security differ from one model to another. Information security contributes directly to increase the level of trust between users by providing an assurance of confidentiality, integrity, and availability. The main goal of this paper proposing an evaluation model of the cryptography systems. in this paper focuses the stream cipher started from its simple component LFSR and then add more than one register and using a linear feedback shift register (LFSR) with Langford arrangements to generate system to achieve randomness and complexity and evaluated based on statistical tests, information theory, soft computing (fuzzy logic), game theory. The results were acceptable and successfully passed the required tests.

Export citation and abstract BibTeX RIS

Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.

Please wait… references are loading.
10.1088/1742-6596/1818/1/012210