Filters








22 Hits in 2.9 sec

A New Keystream Generator MUGI [chapter]

Dai Watanabe, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, Bart Preneel
2002 Lecture Notes in Computer Science  
We present a new keystream generator (KSG) MUGI, which is a variant of Panama proposed at FSE '98.  ...  MUGI has a 128-bit secret key and a 128-bit initial vector as parameters and generates a 64-bit string per round.  ...  Conclusion We have proposed a new keystream generator MUGI built on the idea of Panama. MUGI is efficient in both hardware and software.  ... 
doi:10.1007/3-540-45661-9_14 fatcat:nsnfxzv4zna3bcahtv7qkbnwla

Hardware Implementations For The Iso/Iec 18033-4:2005 Standard For Stream Ciphers

Paris Kitsos
2007 Zenodo  
The proposed implementations achieve throughputs range from 166 Mbps for MICKEY 128 to 6080 Mbps for MUGI.  ...  The two stream ciphers, MUGI and SNOW 2.0 are recently adopted by the International Organization for Standardization ISO/IEC 18033-4:2005 standard.  ...  After the initialization, the 64-bit register latches the generated bits and MUGI generates a 64-bit keystream.  ... 
doi:10.5281/zenodo.1080242 fatcat:skoaeko5m5bgxhfucuctfnyhhq

Rekeying Issues in the MUGI Stream Cipher [chapter]

Matt Henricksen, Ed Dawson
2006 Lecture Notes in Computer Science  
MUGI [15] is a word-based stream cipher designed for 64bit architectures.  ...  This paper proposes a variant of MUGI, entitled MUGI-M, to enhance key agility, and concludes with an analysis of its security and performance characteristics.  ...  In Section 2, we describe the MUGI keystream generation and key initialization algorithms.  ... 
doi:10.1007/11693383_12 fatcat:4fpgwujubjhozcsp4i3j24pjtm

Randomness Evaluation and Hardware Implementation of Nonadditive CA-Based Stream Cipher [article]

Song-Ju Kim, Ken Umeno
2004 arXiv   pre-print
We shall review the cellular automaton(CA)-based pseudorandom-number generators (PRNGs), and show that one of these PRNGs can generate high-quality random numbers which can pass all of the statistical  ...  A CA is suitable for hardware implementation.  ...  Acknowledgements The corresponding author acknowledges a research fellowship from the Japan Society for the Promotion of Science for Young Scientists (JSPS).  ... 
arXiv:nlin/0412028v1 fatcat:ipfsi6j4sfedlbn7vazh3tpisq

The State of Stream Ciphers

Masakatu MORII, Ryoichi TERAMURA
2009 IEICE ESS FUNDAMENTALS REVIEW  
Preneel, A new key stream generator MUGI, Proc. FSE2002, LNCS 2365, pp.179-194, 2002. 5 P. Ekdahl and T. Johansson, A new version of the stream cipher SNOW, Proc.  ...  Goli, Iterative probabilistic cryptanalysis of RC4 keystream generator, Proc. ACISP2000, LNCS 1841, pp.220-233, 2000. SCIS2008 , p.125, Jan. 2008. 16 A.  ... 
doi:10.1587/essfr.2.3_66 fatcat:nrohgmqeaffhfaq4zvj5spepie

Stream cipher designs: a review

Lin Jiao, Yonglin Hao, Dengguo Feng
2020 Science China Information Sciences  
The keystream generated for each frame is only 2745 bits. In Crypto 2013, a real time attack against two-level E0 by the new technique of condition masking and correlation attacks was presented.  ...  No security flaw of the full MUGI stream cipher has been reported so far. MUGI is word-oriented with a word size of 64 bits, and its internal state consists of 19 words.  ... 
doi:10.1007/s11432-018-9929-x fatcat:owggwpyki5dydekbh6dg7zvofm

A New Version of the Stream Cipher SNOW [chapter]

Patrik Ekdahl, Thomas Johansson
2003 Lecture Notes in Computer Science  
A few attacks followed, indicating certain weaknesses in the design. In this paper we propose a new version of SNOW, called SNOW 2.0.  ...  The new version of the cipher does not only appear to be more secure, but its implementation is also a bit faster in software.  ...  A common way to build a stream cipher is to use a pseudorandom length-increasing function (or keystream generator) and mask the plaintext using the output from the keystream generator.  ... 
doi:10.1007/3-540-36492-7_5 fatcat:6v6qeufxibhs3pdfgqo3dpubl4

Fast correlation attacks against stream ciphers and related open problems

A. Canteaut
2005 IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005.  
However, a better adaptation of these techniques to the concrete involved stream ciphers is still an open issue.  ...  Fast correlation attacks have been considerably improved recently, based on efficient decoding algorithms dedicated to very large linear codes in the case of a highly noisy channel.  ...  But, some keystream generators such as PANAMA [8] or MUGI [9] use linear and nonlinear parts of similar sizes.  ... 
doi:10.1109/itwtpi.2005.4638690 dblp:conf/icits/Canteaut05 fatcat:o3fxmlf2mjcgljtp6mv7aoekqe

Dragon: A Fast Word Based Stream Cipher [chapter]

Kevin Chen, Matt Henricksen, William Millan, Joanne Fuller, Leonie Simpson, Ed Dawson, HoonJae Lee, SangJae Moon
2005 Lecture Notes in Computer Science  
This paper presents Dragon, a new stream cipher constructed using a single word based non-linear feedback shift register and a nonlinear filter function with memory.  ...  Dragon uses a variable length key and initialisation vector of 128 or 256 bits, and produces 64 bits of keystream per iteration. At the heart of Dragon are two highly optimised 8 × 32 s-boxes.  ...  Each round of the keystream generation results in the output of a 64-bit word k. Table 3 shows one round of keystream generation.  ... 
doi:10.1007/11496618_5 fatcat:yelitr7z5nguzdfbhjr5sqnvcu

Security and performance analysis of SCDSP

Fardous Mohamed Eljadi, Imad Fakhri Al-Shaikhli
2016 International Journal on Perceptive and Cognitive Computing  
In this paper, SCDSP is evaluated by conducting a performance and security analysis. Furthermore, a comparison between SCDSP and the seven winners of eSTREAM competition is performed.  ...  SCDSP is a dynamic stream cipher that based on these approaches. It uses dynamic structure and parameters to increase the complexity of the cipher to improve its security level.  ...  Cryptrec highly recommended a number of stream ciphers among them: 128 bit RC4, MUGI and MULTI-S01 [4] .  ... 
doi:10.31436/ijpcc.v2i1.33 fatcat:5jvdbijgzfcvnl4vmv4277gvlm

Attack the Dragon [chapter]

Håkan Englund, Alexander Maximov
2005 Lecture Notes in Computer Science  
The original idea of the design is to use a nonlinear feedback shift register (NLFSR) and a linear part (counter), combined by a filter function to generate a new state of the NLFSR and produce the keystream  ...  The attack is based on a statistical weakness introduced into the keystream by the filter function F .  ...  A common way to build a stream cipher is to use a keystream generator (KSG) and add the plaintext and the output from the keystream generator, resembling a one-time pad.  ... 
doi:10.1007/11596219_11 fatcat:gctfnyxpf5cllbmiemtgtxpdnm

A New Stream Cipher HC-256 [chapter]

Hongjun Wu
2004 Lecture Notes in Computer Science  
It generates keystream from a 256-bit secret key and a 256-bit initialization vector. HC-256 consists of two secret tables, each one with 1024 32-bit elements.  ...  At each step one element of a table is updated and one 32-bit output is generated.  ...  From a 256-bit key and a 256-bit initialization vector, it generates keystream with length up to 2 128 bits.  ... 
doi:10.1007/978-3-540-25937-4_15 fatcat:cnledx3ewnejdmkwnfca22qpb4

NON LINEAR FEEDBACK STREAM CIPHER

Dr .R. Siva Ram Prasad, G. Murali, S. Gopi Krishna
2012 International journal of computer and communication technology  
The main aim of this paper is to develop a new generation and innovative security software for applications. We proposed new stream cipher called NLFS.  ...  In selfsynchronous mode key stream generation depending on cipher text. In self synchronous mode generated keystream update first 512-bit buffer and cipher text update the second buffer.  ...  A new initial vector (IV) is used for each new message. • Buffer initialization: This stream cipher uses huge internal state 1024-bits and these 1024 -bits divided into two buffers A and B.  ... 
doi:10.47893/ijcct.2012.1128 fatcat:3uzhjlwx7bfaracnqigkxuiigu

On the sliding property of SNOW 3G and SNOW 2.0

A. Kircanski, A.M. Youssef
2011 IET Information Security  
SNOW 3G is a stream cipher chosen by the 3rd Generation Partnership Project (3GPP) as a crypto-primitive to substitute KASUMI in case its security is compromised.  ...  In this paper, we show that the initialization procedure of the two ciphers admits a sliding property, resulting in several sets of related-key pairs.  ...  If t ≥ 32, the step will be called a keystream generation step. The operators and denote addition and subtraction modulo 2 32 , respectively. III.  ... 
doi:10.1049/iet-ifs.2011.0033 fatcat:bacnxkhmjvhatldx2imodaelnu

A Distinguishing Attack of SNOW 2.0 with Linear Masking Method [chapter]

Dai Watanabe, Alex Biryukov, Christophe De Cannière
2004 Lecture Notes in Computer Science  
Our attack requires 2 225 output words (2 230 bits) and 2 225 steps of analysis to distinguish the output of SNOW 2.0 from a truly random bit sequence.  ...  SNOW 2.0 was developed by Johansson and Ekdahl in 2002, as a modified version of SNOW 1.0. In this paper we present the application of linear (masking) attack to SNOW 2.0 stream cipher.  ...  Introduction A keystream generator (KSG) is a cryptographic primitive used for data encryption and random number generation. Many KSGs have been proposed so far.  ... 
doi:10.1007/978-3-540-24654-1_16 fatcat:nhchu6rks5cffmn7l5rztqmtwq
« Previous Showing results 1 — 15 out of 22 results