Nothing Special   »   [go: up one dir, main page]

Skip to main content

A New Ultrafast Stream Cipher Design: COS Ciphers

  • Conference paper
  • First Online:
Cryptography and Coding (Cryptography and Coding 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2260))

Included in the following conference series:

Abstract

This paper presents a new stream cipher family whose output bits are produced by blocks. We particularly focus on the member of this family producing 128-bit blocks with a 256-bit key. The design is based on a new technique called crossing over which allows to vectorize stream ciphering by using nonlinear shift registers. These algorithms offer a very high cryptographic security and much higher speed encryption than any existing stream ciphers or block ciphers, particularly the AES candidates. A 1000 euros rewarded cryptanalysis challenge is proposed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. R. Anderson, E. Biham, Two Practical and Provable Secure Block Ciphers: BEAR and LION, In Fast Software Encryption 96, number 1039 in Lecture Notes in Computer Science, pp 113–120, Springer Verlag, 1997.

    Google Scholar 

  2. K. Aoki, H. Lipmaa, Fast Implementation of AES Candidates, In Third AES Conference, April 13–14th, 2000, New York.

    Google Scholar 

  3. M. Bellare, J. Killian, P. Rogaway, The security of Cipher Block Chaining, In Advances in Cryptology-CRYPTO’94, number 839 in Lecture Notes in Computer Science, pp 341–358, Springer Verlag.

    Google Scholar 

  4. C.M. Campbell, Design and Specification of Cryptographic Capabilities, IEEE Computer Society Magazine, Vol. 16, Nr. 6, pp 15–19, November 1979.

    Article  Google Scholar 

  5. A. Canteaut, M. Trabbia, Improved Fast Correlation Attacks using Parity-check Equations of weight 4 and 5. In Advances in Cryptology-EUROCRYPT’2000, number 1807 in Lecture Notes in Computer Science, pp 573–588, Springer Verlag 2000.

    Chapter  Google Scholar 

  6. V. Chepyzhov, T. Johansson, B. Smeets. A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers. In Fast Software Encryption 2000, Lecture Notes in Computer Science 1978, Springer Verlag, 2001.

    Chapter  Google Scholar 

  7. E. Filiol, Decimation Attack of Stream Ciphers, In Progress in Cryptology-INDOCRYPT’2000, number 1977 in Lecture Notes in Computer Science, pp 31–42, Springer Verlag, 2000.

    Google Scholar 

  8. E. Filiol, C. Fontaine, Highly Nonlinear Balanced Boolean Functions with a Good Correlation-Immunity, In Advances in Cryptology-EUROCRYPT’98, number 1403 in Lecture Notes in Computer Science, pp 475–488, Springer Verlag, 1998.

    Chapter  Google Scholar 

  9. S.W. Golomb, Shift Register Sequences, Agean Park Press, 1982.

    Google Scholar 

  10. S.W. Golomb, On the Cryptanalysis of Nonlinear Sequences, In 7th IMA Conference on Cryptography and Coding, number 1746 in Lecture Notes in Computer Science, pp 236–242 Springer Verlag, 1999.

    Chapter  Google Scholar 

  11. T. Johansson, F. Jönsson, Improved Fast Correlation Attack on stream Ciphers via Convolutional Codes, In Advances in Cryptology-EUROCRYPT’99, number 1592 in Lecture Notes in Computer Science, pp 347–362, Springer Verlag, 1999.

    Google Scholar 

  12. H. Krawczyk, LFSR-based Hashing and Authentication, In Advances in Cryptology-CRYPTO’94, number 839 in Lecture Notes in Computer Science, pp 129–139 Springer Verlag.

    Google Scholar 

  13. D.E. Knuth, The Art of Computer Programming,, Addison-Wesley, 1984.

    Google Scholar 

  14. X.J. Lai, R.A. Rueppel, J. Woolven, A fast Cryptographic Checksum Algorithm based on Stream Ciphers, In Advances in Cryptology-AUSCRYPT’92, number 718 in Lecture Notes in Computer Science, pp 338–348 Springer Verlag.

    Google Scholar 

  15. S. Maitra, P. Sarkar, Constructions of Non Linear Boolean Functions with important Cryptographic Properties, In Advances in Cryptology-EUROCRYPT’2000, number 1807 in Lecture Notes in Computer Science, pp 485–506, Springer Verlag.

    Google Scholar 

  16. S. Maitra, P. Sarkar, New Directions in Design of Resilient Boolean Functions, In Advances in Cryptology-CRYPTO’00, number 1880 in Lecture Notes in Computer Science, pp 515–532 Springer Verlag.

    Google Scholar 

  17. National Bureau of Standards, NBS FIPS PUB 81, DES Modes of Operation, U.S. Department of Commerce, Dec 1980.

    Google Scholar 

  18. M. Mihaljevic, J.D. Golic, A Fast Iterative Algorithm for a Shift-Register Initial State Reconstruction given the Noisy Output Sequence, In Advances in Cryptology-AUSCRYPT’90, number 453 in Lecture Notes in Computer Science, pp 165–175, Springer Verlag, 1990.

    Chapter  Google Scholar 

  19. P. Rogaway, D. Coppersmith, A Software-optimized Encryption Algorithm. In In Fast Software Encryption 1993, Lecture Notes in Computer Science 809, pp 56–63, Springer Verlag, 1994.

    Google Scholar 

  20. T. Siegenthaler, Decrypting a Class of Stream Ciphers using Ciphertext Only, IEEE Transactions on Computers, C-34, 1, pp 81–84, 1985.

    Article  Google Scholar 

  21. Y. Tarannikov, On resilient Boolean Functions with Maximal Possible Nonlinearity, http://www.eprint.iacr.org/2000/005.ps.

  22. K. Zheng, M. Huang, On the Linear Syndrome Method in Cryptanalysis, In Advances in Cryptology-CRYPTO’88, number 405 in Lecture Notes in Computer Science, pp 469–478, Springer Verlag, 1990.

    Google Scholar 

  23. K. Zeng, C.H. Yang, T.R. Rao, An Improved Linear Syndrome Algorithm in Cryptanalysis with Applications, In Advances in Cryptology-CRYPTO’90, number 537 in Lecture Notes in Computer Science, pp 34–47, Springer Verlag, 1991.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Filiol, E., Fontaine, C. (2001). A New Ultrafast Stream Cipher Design: COS Ciphers. In: Honary, B. (eds) Cryptography and Coding. Cryptography and Coding 2001. Lecture Notes in Computer Science, vol 2260. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45325-3_9

Download citation

  • DOI: https://doi.org/10.1007/3-540-45325-3_9

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-43026-1

  • Online ISBN: 978-3-540-45325-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics