A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
A New Keystream Generator MUGI
[chapter]
2002
Lecture Notes in Computer Science
We present a new keystream generator (KSG) MUGI, which is a variant of Panama proposed at FSE '98. ...
MUGI has a 128-bit secret key and a 128-bit initial vector as parameters and generates a 64-bit string per round. ...
Conclusion We have proposed a new keystream generator MUGI built on the idea of Panama. MUGI is efficient in both hardware and software. ...
doi:10.1007/3-540-45661-9_14
fatcat:nsnfxzv4zna3bcahtv7qkbnwla
Hardware Implementations For The Iso/Iec 18033-4:2005 Standard For Stream Ciphers
2007
Zenodo
The proposed implementations achieve throughputs range from 166 Mbps for MICKEY 128 to 6080 Mbps for MUGI. ...
The two stream ciphers, MUGI and SNOW 2.0 are recently adopted by the International Organization for Standardization ISO/IEC 18033-4:2005 standard. ...
After the initialization, the 64-bit register latches the generated bits and MUGI generates a 64-bit keystream. ...
doi:10.5281/zenodo.1080242
fatcat:skoaeko5m5bgxhfucuctfnyhhq
Rekeying Issues in the MUGI Stream Cipher
[chapter]
2006
Lecture Notes in Computer Science
MUGI [15] is a word-based stream cipher designed for 64bit architectures. ...
This paper proposes a variant of MUGI, entitled MUGI-M, to enhance key agility, and concludes with an analysis of its security and performance characteristics. ...
In Section 2, we describe the MUGI keystream generation and key initialization algorithms. ...
doi:10.1007/11693383_12
fatcat:4fpgwujubjhozcsp4i3j24pjtm
Randomness Evaluation and Hardware Implementation of Nonadditive CA-Based Stream Cipher
[article]
2004
arXiv
pre-print
We shall review the cellular automaton(CA)-based pseudorandom-number generators (PRNGs), and show that one of these PRNGs can generate high-quality random numbers which can pass all of the statistical ...
A CA is suitable for hardware implementation. ...
Acknowledgements The corresponding author acknowledges a research fellowship from the Japan Society for the Promotion of Science for Young Scientists (JSPS). ...
arXiv:nlin/0412028v1
fatcat:ipfsi6j4sfedlbn7vazh3tpisq
The State of Stream Ciphers
2009
IEICE ESS FUNDAMENTALS REVIEW
Preneel,
A new key stream generator MUGI, Proc. FSE2002, LNCS 2365,
pp.179-194, 2002.
5
P. Ekdahl and T. Johansson, A new version of the stream cipher
SNOW, Proc. ...
Goli, Iterative probabilistic cryptanalysis of RC4 keystream generator, Proc. ACISP2000, LNCS 1841, pp.220-233, 2000. SCIS2008 , p.125, Jan. 2008. 16 A. ...
doi:10.1587/essfr.2.3_66
fatcat:nrohgmqeaffhfaq4zvj5spepie
Stream cipher designs: a review
2020
Science China Information Sciences
The keystream generated for each frame is only 2745 bits. In Crypto 2013, a real time attack against two-level E0 by the new technique of condition masking and correlation attacks was presented. ...
No security flaw of the full MUGI stream cipher has been reported so far. MUGI is word-oriented with a word size of 64 bits, and its internal state consists of 19 words. ...
doi:10.1007/s11432-018-9929-x
fatcat:owggwpyki5dydekbh6dg7zvofm
A New Version of the Stream Cipher SNOW
[chapter]
2003
Lecture Notes in Computer Science
A few attacks followed, indicating certain weaknesses in the design. In this paper we propose a new version of SNOW, called SNOW 2.0. ...
The new version of the cipher does not only appear to be more secure, but its implementation is also a bit faster in software. ...
A common way to build a stream cipher is to use a pseudorandom length-increasing function (or keystream generator) and mask the plaintext using the output from the keystream generator. ...
doi:10.1007/3-540-36492-7_5
fatcat:6v6qeufxibhs3pdfgqo3dpubl4
Fast correlation attacks against stream ciphers and related open problems
2005
IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005.
However, a better adaptation of these techniques to the concrete involved stream ciphers is still an open issue. ...
Fast correlation attacks have been considerably improved recently, based on efficient decoding algorithms dedicated to very large linear codes in the case of a highly noisy channel. ...
But, some keystream generators such as PANAMA [8] or MUGI [9] use linear and nonlinear parts of similar sizes. ...
doi:10.1109/itwtpi.2005.4638690
dblp:conf/icits/Canteaut05
fatcat:o3fxmlf2mjcgljtp6mv7aoekqe
Dragon: A Fast Word Based Stream Cipher
[chapter]
2005
Lecture Notes in Computer Science
This paper presents Dragon, a new stream cipher constructed using a single word based non-linear feedback shift register and a nonlinear filter function with memory. ...
Dragon uses a variable length key and initialisation vector of 128 or 256 bits, and produces 64 bits of keystream per iteration. At the heart of Dragon are two highly optimised 8 × 32 s-boxes. ...
Each round of the keystream generation results in the output of a 64-bit word k. Table 3 shows one round of keystream generation. ...
doi:10.1007/11496618_5
fatcat:yelitr7z5nguzdfbhjr5sqnvcu
Security and performance analysis of SCDSP
2016
International Journal on Perceptive and Cognitive Computing
In this paper, SCDSP is evaluated by conducting a performance and security analysis. Furthermore, a comparison between SCDSP and the seven winners of eSTREAM competition is performed. ...
SCDSP is a dynamic stream cipher that based on these approaches. It uses dynamic structure and parameters to increase the complexity of the cipher to improve its security level. ...
Cryptrec highly recommended a number of stream ciphers among them: 128 bit RC4, MUGI and MULTI-S01 [4] . ...
doi:10.31436/ijpcc.v2i1.33
fatcat:5jvdbijgzfcvnl4vmv4277gvlm
Attack the Dragon
[chapter]
2005
Lecture Notes in Computer Science
The original idea of the design is to use a nonlinear feedback shift register (NLFSR) and a linear part (counter), combined by a filter function to generate a new state of the NLFSR and produce the keystream ...
The attack is based on a statistical weakness introduced into the keystream by the filter function F . ...
A common way to build a stream cipher is to use a keystream generator (KSG) and add the plaintext and the output from the keystream generator, resembling a one-time pad. ...
doi:10.1007/11596219_11
fatcat:gctfnyxpf5cllbmiemtgtxpdnm
A New Stream Cipher HC-256
[chapter]
2004
Lecture Notes in Computer Science
It generates keystream from a 256-bit secret key and a 256-bit initialization vector. HC-256 consists of two secret tables, each one with 1024 32-bit elements. ...
At each step one element of a table is updated and one 32-bit output is generated. ...
From a 256-bit key and a 256-bit initialization vector, it generates keystream with length up to 2 128 bits. ...
doi:10.1007/978-3-540-25937-4_15
fatcat:cnledx3ewnejdmkwnfca22qpb4
NON LINEAR FEEDBACK STREAM CIPHER
2012
International journal of computer and communication technology
The main aim of this paper is to develop a new generation and innovative security software for applications. We proposed new stream cipher called NLFS. ...
In selfsynchronous mode key stream generation depending on cipher text. In self synchronous mode generated keystream update first 512-bit buffer and cipher text update the second buffer. ...
A new initial vector (IV) is used for each new message. • Buffer initialization: This stream cipher uses huge internal state 1024-bits and these 1024 -bits divided into two buffers A and B. ...
doi:10.47893/ijcct.2012.1128
fatcat:3uzhjlwx7bfaracnqigkxuiigu
On the sliding property of SNOW 3G and SNOW 2.0
2011
IET Information Security
SNOW 3G is a stream cipher chosen by the 3rd Generation Partnership Project (3GPP) as a crypto-primitive to substitute KASUMI in case its security is compromised. ...
In this paper, we show that the initialization procedure of the two ciphers admits a sliding property, resulting in several sets of related-key pairs. ...
If t ≥ 32, the step will be called a keystream generation step. The operators and denote addition and subtraction modulo 2 32 , respectively. III. ...
doi:10.1049/iet-ifs.2011.0033
fatcat:bacnxkhmjvhatldx2imodaelnu
A Distinguishing Attack of SNOW 2.0 with Linear Masking Method
[chapter]
2004
Lecture Notes in Computer Science
Our attack requires 2 225 output words (2 230 bits) and 2 225 steps of analysis to distinguish the output of SNOW 2.0 from a truly random bit sequence. ...
SNOW 2.0 was developed by Johansson and Ekdahl in 2002, as a modified version of SNOW 1.0. In this paper we present the application of linear (masking) attack to SNOW 2.0 stream cipher. ...
Introduction A keystream generator (KSG) is a cryptographic primitive used for data encryption and random number generation. Many KSGs have been proposed so far. ...
doi:10.1007/978-3-540-24654-1_16
fatcat:nhchu6rks5cffmn7l5rztqmtwq
« Previous
Showing results 1 — 15 out of 22 results