Filters








1,530 Hits in 2.2 sec

Nonlinear Equivalence of Stream Ciphers [chapter]

Sondre Rønjom, Carlos Cid
2010 Lecture Notes in Computer Science  
In this paper we investigate nonlinear equivalence of stream ciphers over a finite field, exemplified by the pure LFSR-based filter generator over F2.  ...  We define a nonlinear equivalence class consisting of filter generators of length n that generate a binary keystream of period dividing 2 n −1, and investigate certain cryptographic properties of the ciphers  ...  Acknowledgements The work described in this paper was carried out while the first author was visiting Royal Holloway, University of London, supported by the Norwegian Research Council.  ... 
doi:10.1007/978-3-642-13858-4_3 fatcat:gyboymdbxbgw5m3k3ta7lncjn4

On the Number of Equivalence Classes in Certain Stream Ciphers [chapter]

L. Javier García-Villalba
2003 Lecture Notes in Computer Science  
Most common sequence generators in stream cipher systems are based on a combination of one LFSR and a nonlinear function applied to the stages of the LFSR.  ...  The present work is concerned with the problem of the determination of the number of nonlinear filters with different linear complexity.  ...  May 29, 2000 Most common sequence generators in stream cipher systems are based on a combination of one LFSR and a nonlinear function applied to the stages of the LFSR.  ... 
doi:10.1007/3-540-44842-x_14 fatcat:og3lgra765g7jaggqylh2l5lkq

Espresso: A stream cipher for 5G wireless communication systems

Elena Dubrova, Martin Hell
2015 Cryptography and Communications  
In this paper, we present a methodology for designing a class of stream ciphers which takes into account both parameters simultaneously.  ...  According to our analysis, the presented stream cipher Espresso is the fastest among the ciphers below 1500 GE, including Grain-128 and Trivium.  ...  Acknowledgements This work carried out during the research visits of authors at the security group at Ericsson Research in 2013-2014 and supported by the grants SM12-0005 and SM12-0025 from the Swedish  ... 
doi:10.1007/s12095-015-0173-2 fatcat:bqf2lzyojvaovd3h3pwfqu7gwe

A Stream Cipher Proposal: Grain-128

Martin Hell, Thomas Johansson, Alexander Maximov, Willi Meier
2006 2006 IEEE International Symposium on Information Theory  
Grain-128 supports key size of 128 bits and IV size of 96 bits. The design is very simple and based on two shift registers, one linear and one nonlinear, and an output function.  ...  A new stream cipher, Grain-128, is proposed. The design is very small in hardware and it targets environments with very limited resources in gate count, power consumption, and chip area.  ...  The purpose of this paper is to propose a 128-bit version of the stream cipher Grain. Grain is a binary additive stream cipher.  ... 
doi:10.1109/isit.2006.261549 dblp:conf/isit/Hell0MM06 fatcat:brscoilfzbdhbc2biuoxuw4pni

The differential cryptanalysis and design of natural stream ciphers [chapter]

Cunsheng Ding
1994 Lecture Notes in Computer Science  
This work is illustrated by reference to the design and security of additive natural stream ciphers, which are nonlinear filtered sequences driven by a counter rather than by a shift register.  ...  This paper introduces the differential cryptanalysis of additive stream ciphers, and develops its theoretical basis.  ...  It is equivalent to the following: 1. nonlinearity analysis of ](x) with respect to ZN and G; 2. autocorrelation analysis of the key stream sequences; 3. analysis of the mutual information between the  ... 
doi:10.1007/3-540-58108-1_13 fatcat:hlphmli7mrex3axhui4dx7pbgu

Guess and Determine Attack on Bivium

Neda Rohani, Zainab Noferesti, Javad Mohajeri, Mohammad Reza Aref
2011 Journal of Information Processing Systems  
In this paper, a guess and determine attack on this cipher is introduced. In the proposed method, the best linear approximations for the updating functions are first defined.  ...  Bivium is a simplified version of Trivium, a hardware profile finalist of the eSTREAM project. Bivium has an internal state size of 177 bits and a key length of 80 bits.  ...  Stream ciphers typically execute at a higher speed than block ciphers and have lower hardware complexity. A stream cipher generates successive elements of the keystream based on an internal state.  ... 
doi:10.3745/jips.2011.7.1.151 fatcat:n4kgsxr2gzdqbkzemj7hu26v4a

State convergence and keyspace reduction of the Mixer stream cipher

Sui-Guan Teo, Kenneth Koon-Ho Wong, Ed Dawson, Leonie Simpson
2012 Journal of Discrete Mathematical Sciences and Cryptography  
This paper presents an analysis of the stream cipher Mixer, a bit-based cipher with structural components similar to the well-known Grain cipher and the LILI family of keystream generators.  ...  Edward (2012) State convergence and keyspace reduction of the mixer stream cipher. Journal of Discrete Mathematical Sciences and Cryptography, 15, pp. 89-104. This file was downloaded from: Abstract.  ...  Some stream ciphers use both explicit and implicit methods to provide nonlinearity.  ... 
doi:10.1080/09720529.2012.10698366 fatcat:youhgtffpreq5bnfebv2zvm5c4

Randomized Stream Ciphers with Enhanced Security Based on Nonlinear Random Coding

Anton Alekseychuk, Sergey Gryshakov
2015 Journal of Mathematics and System Science  
We propose a framework for designing randomized stream ciphers with enhanced security.  ...  The key attribute of this framework is using of nonlinear bijective mappings or keyless hash functions for random coding.  ...  Thus the key attribute of the proposed framework is using of the above mentioned nonlinear mappings for designing randomized stream ciphers.  ... 
doi:10.17265/2159-5291/2015.12.004 fatcat:uirfaasnjbdpvd5mp3oyutvmzq

NOCAS : A Nonlinear Cellular Automata Based Stream Cipher

Sandip Karmakar, Dipanwita Roy Chowdhury
2011 Discrete Mathematics & Theoretical Computer Science  
International audience LFSR and NFSR are the basic building blocks in almost all the state of the art stream ciphers like Trivium and Grain-128.  ...  In this work, a stream cipher is presented based on hybrid CA. The stream cipher takes 128 bit key and 128 bit initialization vector (IV) as input.  ...  Since the decimal equivalent of the output 00111100 is 60, rule number of f is, 60.  ... 
doi:10.46298/dmtcs.2970 fatcat:qzqatfyxkbg57lxdfucfsk3gn4

On Lightweight Stream Ciphers with Shorter Internal States [chapter]

Frederik Armknecht, Vasily Mikhalev
2015 Lecture Notes in Computer Science  
We demonstrate the feasibility of this approach by describing and implementing a concrete stream cipher Sprout which uses significantly less area than comparable existing lightweight stream ciphers.  ...  To be resistant against certain time-memory-data-tradeoff (TMDTO) attacks, a common rule of thumb says that the internal state size of a stream cipher should be at least twice the security parameter.  ...  The output of the cipher is a nonlinear function which takes several LFSR and NLFSR bits as its input.  ... 
doi:10.1007/978-3-662-48116-5_22 fatcat:eb3552jupveb7iakcdabt4zpea

Parametric Guess and Determine Attack on Stream Ciphers

Orhun Kara, Ebru Kucukkubas
2019 2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops)  
Traditionally, key stream generators of stream ciphers update their internal states only by using their current internal state.  ...  Although it has been common in the cryptology community that stream ciphers are more ecient in speed and area than symmetric block ciphers, it has been seen in the last 10-15 years that most of ciphers  ...  The structure of key stream equivalent states is shown in Figure 3.1. Figure 3 . 1 : 31 Key Stream Equivalent States [32] two dierent values of xed part result in two dierent equivalent classes.  ... 
doi:10.1109/pimrcw.2019.8880834 dblp:conf/pimrc/KaraK19 fatcat:mxupumco3fdzxpj36kztar4owe

Turing: A Fast Stream Cipher [chapter]

Gregory G. Rose, Philip Hawkes
2003 Lecture Notes in Computer Science  
It combines an LFSR generator based on that of SOBER[27] with a keyed mixing function reminiscent of a block cipher round.  ...  This paper proposes the Turing stream cipher. Turing offers up to 256-bit key strength, and is designed for extremely efficient software implementation.  ...  Denis, Scott Fluhrer, David McGrew and David Wagner for useful insights and feedback into the design of Turing.  ... 
doi:10.1007/978-3-540-39887-5_22 fatcat:hdrofq6ycje4pizi4xdfij6vgm

Parallel stream cipher for secure high-speed communications

Hoonjae Lee, Sangjae Moon
2002 Signal Processing  
When compared with a conventional stream cipher, the properties of the proposed cipher exhibited the same crypto-degree with m-times faster processing. ?  ...  Finally, an m-parallel SUM-BSG with 8-parallel for detail is proposed as a design example of the proposed parallel stream cipher.  ...  cipher which combines the strengths of stream and block ciphers, that is, the security and freedom from propagation error of a stream cipher and the block or parallel processing ability of a block cipher  ... 
doi:10.1016/s0165-1684(01)00180-3 fatcat:gat5hayfgrhlzbd4qxdshtkybq

Design and Assessment of a Novel Encryption Algorithm for a Special Purpose Virtual Private Networks

Hany Ramzy, Mohamed Hussein, Alaa Omar, Khaled Shehata
2018 The International Conference on Electrical Engineering  
The security analysis of the proposed was conducted and the National Institute of Standards and technology statistical tests have been applied to the output of the algorithm proving its secrecy and randomness  ...  The Virtual Private Network (VPN) technology provides a way of protecting information being transmitted over unsecure network.  ...  The frequency test applied to the original stream and its first binary derivative is equivalent to testing for an equal number of the four overlapping two-tulles in the original stream.  ... 
doi:10.21608/iceeng.2018.30169 fatcat:trtsr3r535ffjplxxzydmrzili

Design of a Lightweight Stream Cipher: BOKHARI 256

Prof. M. U. Bokhari, Shabbir Hassan, Aligarh Muslim University
2020 International Journal of Engineering Research and  
Symmetric key cryptography is the most commonly used primitive and stream cipher, in particular, meets the requirement of such algorithms.  ...  BOKHARI 256 has designed using the feature of some well-known stream ciphers like FRUIT, LIZARD, SOBER and Grain 128 to improve the performance.  ...  After that, both polynomials ( ) and ( ) are filled with the binary stream equivalent to the polynomial ( ) = + + + + ( ) = + + which are equivalent to the seed and respectively.  ... 
doi:10.17577/ijertv9is030509 fatcat:wneqltmcdfburkcop33t2x5qqe
« Previous Showing results 1 — 15 out of 1,530 results