Security Weaknesses in Maurer-Like Randomized Stream Ciphers
N. Ferguson, B. Schneier, and D. Wagner
Fifth Australasian Conference on Information Security and Privacy (ACISP 2000), to appear.
ABSTRACT: TriStrata appears to have implemented a variation of Maurer's randomised cipher. We define a variation of Maurer's cipher that appears to be similar to the TriStrata version, and show several cryptanalytical attacks against our variant.
Photo of Bruce Schneier by Per Ervland.
Schneier on Security is a personal website. Opinions expressed are not necessarily those of Resilient Systems, Inc..