Filters








41 Hits in 4.8 sec

Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles [chapter]

Christophe De Cannière
2006 Lecture Notes in Computer Science  
In this paper, we propose a new stream cipher construction based on block cipher design principles.  ...  The main idea is to replace the building blocks used in block ciphers by equivalent stream cipher components.  ...  Basic Construction A well-known way to construct a key stream generator from a block cipher is to use the cipher in output feedback (OFB) mode.  ... 
doi:10.1007/11836810_13 fatcat:a5vxvxwqbngxxlv6qd3kqgganm

Quavium - A New Stream Cipher Inspired by Trivium

Yun Tian, Gongliang Chen, Jianhua Li
2012 Journal of Computers  
This paper is concerned with an extensive form of stream cipher Trivium. Trivium is extended to a scalable form by the coupling connection of Trivium-like shift registers.  ...  As the main contribution, a new stream cipher Quavium is proposed based on 4-round Trivium-like shift registers and k-order primitive polynomials. Quavium can also be used with 3 rounds.  ...  The design of Trivium is inspired by the block cipher design principles [3] . S-box in a block cipher is substituted by a non-linear one-bit-output function.  ... 
doi:10.4304/jcp.7.5.1278-1283 fatcat:7jdlwa45effx5cz6smnhomxssa

Hard Fault Analysis of Trivium [article]

Hu Yupu, Zhang Fengrong, Zhang Yiwei
2009 arXiv   pre-print
As a hardware-oriented stream cipher, Trivium is weak under soft fault analysis.  ...  Fault analysis is a powerful attack to stream ciphers. Up to now, the major idea of fault analysis is to simplify the cipher system by injecting some soft faults. We call it soft fault analysis.  ...  “Trivium: a stream cipher construction inspired by block cipher design principle,” eSTREAM, ECRYPT Stream Cipher Project, Report 2005/30 (2005), Available: http://www.ecrypt.eu.org/stream [  ... 
arXiv:0907.2315v1 fatcat:vscvuvot6bhx5nne2thkcrm4ca

Trivium stream cipher countermeasures against fault injection attacks and DFA

F.E. Potestad-Ordonez, E. Tena-Sanchez, J.M. Mora-Gutierrez, M. Valencia-Barrero, C.J. Jimenez-Fernandez
2021 IEEE Access  
De Cannière, ‘‘Trivium: A stream cipher construction inspired by block cipher design principles,’’ in Proc. 9th  ...  TRIVIUM STREAM CIPHER determine whether the fault detection latency can be The Trivium stream cipher [7] is one of the finalists of the exploited by the DFAs.  ... 
doi:10.1109/access.2021.3136609 fatcat:cvte57pfcva33an2exzai6zeky

Estimations of cryptographic resistance of ciphers in the trivium family to sat-based cryptanalysis
Оценки стойкости шифров семейства Trivium к криптоанализу на основе алгоритмов решения проблемы булевой выполнимости

O.S. Zaikin, I. V. Otpuschennikov, A. A. Semenov
2016 Prikladnaya diskretnaya matematika Prilozhenie  
Представлены результаты криптоанализа трёх поточных шифров семейства Trivium (Bivium, Trivium toy, Bivium toy).  ...  В [8] введены в рассмотрение т. н. игрушечные версии шифров Trivium и Bivium соответственно Trivium toy и Bivium toy.  ...  Trivium: A stream cipher construction inspired by block cipher design principles // LNCS. 2006. V. 4176. P. 171-186. 2. Maximov A. and Biryukov A. Two trivial attacks on Trivium // SAC'07.  ... 
doi:10.17223/2226308x/9/19 fatcat:xqvr24jckbgdfauzqn2qpz7pcm

A Survey on Stream Ciphers for Constrained Environments

Alaa Kadhim Farhan
2021 Zenodo  
A stream cipher is faster and less complex than block ciphers so it is suitable with the Internet of Things (IoT).  ...  Lightweight ciphers are defined as symmetric ciphers. They could be categorized into stream and block ciphers.  ...  X-Lizard The Lizard's design was inspired by the stream ciphers Grain family. Lizard's internal state is spread over two interconnected feedback shift registers (FSRs).  ... 
doi:10.5281/zenodo.5732804 fatcat:5izov35nwzbrzp6nkjgftvqzpy

Stream cipher designs: a review

Lin Jiao, Yonglin Hao, Dengguo Feng
2020 Science China Information Sciences  
Block cipher based stream cipher Many stream ciphers are proposed with the design idea of block ciphers, such as based on the basic operation, round function or algorithm structure of a block cipher, even  ...  According to the different design methods, we analyzed their advantages and shortages in order to inspire the further research in stream cipher designs.  ... 
doi:10.1007/s11432-018-9929-x fatcat:owggwpyki5dydekbh6dg7zvofm

A2U2: A stream cipher for printed electronics RFID tags

Mathieu David, Damith C. Ranasinghe, Torben Larsen
2011 2011 IEEE International Conference on RFID  
In this paper we present a new stream cipher, A2U2, which uses principles of stream cipher design and approaches from block cipher design.  ...  , with the added benefit of high throughput provided by stream ciphers.  ...  Nevertheless, there is a large body of established guidelines and design principles for building stream ciphers such as those elaborated by Rueppel [10] .  ... 
doi:10.1109/rfid.2011.5764619 fatcat:azj4iwexv5ck3hbk44ursxit6i

On Lightweight Stream Ciphers with Shorter Internal States [chapter]

Frederik Armknecht, Vasily Mikhalev
2015 Lecture Notes in Computer Science  
We demonstrate the feasibility of this approach by describing and implementing a concrete stream cipher Sprout which uses significantly less area than comparable existing lightweight stream ciphers.  ...  We argue that a simple shift in the established design paradigm, namely to involve the fixed secret key not only in the initialization process but in the keystream generation phase as well, enables stream  ...  Stream ciphers usually allow for a higher throughput but require a larger area size compared to block ciphers.  ... 
doi:10.1007/978-3-662-48116-5_22 fatcat:eb3552jupveb7iakcdabt4zpea

LIZARD – A Lightweight Stream Cipher for Power-constrained Devices

Matthias Hamann, Matthias Krause, Willi Meier
2017 IACR Transactions on Symmetric Cryptology  
Its hardware efficiency results from combining a Grain-like design with the FP(1)-mode, a recently suggested construction principle for the state initialization of stream ciphers, which offers provable  ...  In this paper, we present Lizard, a lightweight stream cipher for power-constrained devices like passive RFID tags.  ...  Test vectors can be found in appendix A. Design Specification The design of Lizard is similar to (and was in fact inspired by) that of the Grain family [HJMM08] of stream ciphers.  ... 
doi:10.46586/tosc.v2017.i1.45-79 fatcat:aap4zegsgvfbhe5ly76inmpkrm

LIZARD – A Lightweight Stream Cipher for Power-constrained Devices

Matthias Hamann, Matthias Krause, Willi Meier
2017 IACR Transactions on Symmetric Cryptology  
Its hardware efficiency results from combining a Grain-like design with the FP(1)-mode, a recently suggested construction principle for the state initialization of stream ciphers, which offers provable  ...  In this paper, we present Lizard, a lightweight stream cipher for power-constrained devices like passive RFID tags.  ...  Test vectors can be found in appendix A. Design Specification The design of Lizard is similar to (and was in fact inspired by) that of the Grain family [HJMM08] of stream ciphers.  ... 
doi:10.13154/tosc.v2017.i1.45-79 dblp:journals/tosc/HamannKM17 fatcat:yy3mitkbqfftlbhxdbw7nupkzu

Quark: A Lightweight Hash

Jean-Philippe Aumasson, Luca Henzen, Willi Meier, María Naya-Plasencia
2012 Journal of Cryptology  
Inspired by the lightweight ciphers Grain and KATAN, we present the hash function family Quark, composed of the three instances u-Quark, d-Quark, and t-Quark.  ...  In this paper, we thus propose a novel design philosophy for lightweight hash functions, based on a single security level and on the sponge construction, to minimize memory requirements.  ...  The block cipher family KATAN [18] (CHES 2009) is inspired by the stream cipher Trivium [19] and builds a keyed permutation with two NFSR's combined with two light quadratic Boolean functions.  ... 
doi:10.1007/s00145-012-9125-6 fatcat:xdi7vyyuufclhjxdx7uooq6v5q

Quark: A Lightweight Hash [chapter]

Jean-Philippe Aumasson, Luca Henzen, Willi Meier, María Naya-Plasencia
2010 Lecture Notes in Computer Science  
Inspired by the lightweight ciphers Grain and KATAN, we present the hash function family Quark, composed of the three instances u-Quark, d-Quark, and t-Quark.  ...  In this paper, we thus propose a novel design philosophy for lightweight hash functions, based on a single security level and on the sponge construction, to minimize memory requirements.  ...  The block cipher family KATAN [18] (CHES 2009) is inspired by the stream cipher Trivium [19] and builds a keyed permutation with two NFSR's combined with two light quadratic Boolean functions.  ... 
doi:10.1007/978-3-642-15031-9_1 fatcat:yut4cixcmbabbj7xesf2x2szci

On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks

Matthias Hamann, Matthias Krause
2018 Cryptography and Communications  
The Lizard-construction proposes a state initialization algorithm for stream ciphers working in packet mode (like the GSM cipher A5/1 or the Bluetooth cipher E0).  ...  This implies that practical stream ciphers have to have a comparatively large inner state length (e.g., n = 288 bit for Trivium [6] and n = 160 bit for Grain v1 [16] ).  ...  Trivium [6] and Grain [16] can be considered examples of stream ciphers designed for one-stream mode due to their extremely large limits (e.g., 2 64 bits for Trivium) on the amount of keystream generated  ... 
doi:10.1007/s12095-018-0294-5 fatcat:utew6dnihrhfrbdhk6b7g6supi

Fault-based attacks on cryptographic hardware

I. Polian, M. Kreuzer
2013 2013 IEEE 16th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS)  
They circumvent the protection by inducing faults into the hardware implementation of cryptographic functions, thus affecting encryption and/or decryption in a controlled way.  ...  Fault-based attacks are a relatively new threat to system integrity.  ...  Block ciphers process chunks of data with a well-defined length (e.g., 128 bits), whereas stream ciphers process data continuously bit-by-bit.  ... 
doi:10.1109/ddecs.2013.6549781 dblp:conf/ddecs/PolianK13 fatcat:463ms2z3draxdkuox4i72ib7fi
« Previous Showing results 1 — 15 out of 41 results