Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1007/978-3-642-11145-7_5guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

The rakaposhi Stream Cipher

Published: 14 December 2009 Publication History

Abstract

In this paper, we introduce the rakaposhi stream cipher. The algorithm is based on Dynamic Linear Feedback Shift Registers, with a simple and potentially scalable design, and is particularly suitable for hardware applications with restricted resources. The rakaposhi stream cipher offers 128-bit security, and aims to complement the current eSTREAM portfolio of hardware-oriented stream ciphers.

References

[1]
Arnault F., Berger T., and Lauradoux C. Robshaw M.J.B. and Billet O. F-FCSR Stream Ciphers New Stream Cipher Designs 2008 Heidelberg Springer 170-178
[2]
Babbage, S.: Improved ”exhaustive search” attacks on stream ciphers. In: IEE European Convention on Security and Detection, vol. 408, pp. 161–165 (1995)
[3]
Babbage, S., De Canniere, C., Canteaut, A., Cid, C., Gilbert, H., Johansson, T., Parker, M., Preneel, B., Rijmen, V., Robshaw, M.: The eSTREAM Portfolio (rev.1), September 08 (2008), http://www.ecrypt.eu.org/stream/portfolio_revision1.pdf
[4]
Babbage, S., De Canniere, C., Canteaut, A., Cid, C., Gilbert, H., Johansson, T., Parker, M., Preneel, B., Rijmen, V., Robshaw, M.: The eSTREAM Portfolio, April 15 (2008), http://www.ecrypt.eu.org/stream/portfolio.pdf
[5]
Babbage S. and Dodd M. Robshaw M.J.B. and Billet O. The MICKEY Stream Ciphers New Stream Cipher Designs 2008 Heidelberg Springer 191-209
[6]
Beth T. and Piper F.C. Beth T., Cot N., and Ingemarsson I. The stop-and-go-generator Advances in Cryptology 1985 Heidelberg Springer 88-92
[7]
Biryukov A. and Shamir A. Okamoto T. Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers Advances in Cryptology - ASIACRYPT 2000 2000 Heidelberg Springer 1-13
[8]
Cid, C., Robshaw, M.: The eSTREAM Portfolio 2009 Annual Update, July 31 (2009), http://www.ecrypt.eu.org/stream/eStream_reportJul09.pdf
[9]
Courtois N. and Meier W. Biham E. Algebraic Attacks on Stream Ciphers with Linear Feedback Advances in Cryptology – EUROCRPYT 2003 2003 Heidelberg Springer 345-359
[10]
Dinur I. and Shamir A. Joux A. Cube Attacks on Tweakable Black Box Polynomials EUROCRYPT 2009 2009 Heidelberg Springer 278-299
[11]
Dunkelman O. and Keller N. Treatment of the Initial Value in Time-Memory-Data Tradeoff Attacks on Stream Ciphers Information Processing Letters 2008 107 133-137
[12]
eSTREAM, the ECRYPT Stream Cipher Project, http://www.ecrypt.eu.org/stream/
[13]
Gaj, K., Southern, G., Bachimanchi, R.: Comparison of hardware performance of selected Phase II eSTREAM candidates. In: Proceedings of SASC 2007, Bochum (2007)
[14]
Golic J.D. Gollmann D. On Security of Nonlinear Filter Generators Fast Software Encryption 1996 Heidelberg Springer 173-188
[15]
Hell M. and Johansson T. Pieprzyk J. Breaking the F-FCSR-H Stream Cipher in Real Time Advances in Cryptology - ASIACRYPT 2008 2008 Heidelberg Springer 557-569
[16]
Hell M., Johansson T., and Brynielsson L. An overview of distinguishing attacks on stream ciphers Cryptography and Communications 2009 1 1 71-94
[17]
Hell M., Johansson T., Maximov A., and Meier W. A stream cipher proposal: Grain-128 Proceedings of 2006 IEEE International Symposium on Information Theory 2006 Los Alamitos IEEE 1614-1618
[18]
Hellman M.E. A Cryptanalytic Time-Memory Tradeoff IEEE Transactions on Information Theory 1980 26 4 401-406
[19]
Hong J. and Sarkar P. Roy B. New Applications of Time Memory Data Tradeoffs Advances in Cryptology - ASIACRYPT 2005 2005 Heidelberg Springer 353-372
[20]
Hong, J., Sarkar, P.: Rediscovery of Time Memory Tradeoffs. Cryptology ePrint Archive, Report 2005/090 (2005), http://eprint.iacr.org/
[21]
Horan D. and Guinee R. A Novel Keystream Generator using Pseudo Random Binary Sequences for Cryptographic Applications Irish Signals and Systems Conference 2006 2006 Los Alamitos IEEE 451-456
[22]
Hwang, D., Chaney, M., Karanam, S., Ton, N., Gaj, K.: Comparison of FPGA-Targeted Hardware Implementations of eSTREAM Stream Cipher Candidates. In: Proceedings of SASC (2008); Lausanne
[23]
Kiyomoto, S., Tanaka, T., Sakurai, K.: FPGA-Targeted Hardware Implementations of K2. In: Proceedings of SECRYPT 2008, pp. 270–277 (2008)
[24]
Kiyomoto, S., Tanaka, T., Sakurai, K.: K2: A Stream Cipher Algorithm Using Dynamic Feedback Control. In: Proceedings of SECRYPT 2007, pp. 204–213 (2008)
[25]
Lee Y., Jeong K., Sung J., and Hong S. Mu Y., Susilo W., and Seberry J. Related-Key Chosen IV Attacks on Grain-v1 and Grain-128 Information Security and Privacy 2008 Heidelberg Springer 321-335
[26]
Matsui M. Helleseth T. Linear Cryptanalysis Method for DES Cipher Advances in Cryptology - EUROCRYPT ’93 1994 Heidelberg Springer 386-397
[27]
Medina, M., Domínguez, A.: Caracterización de Secuencias Binarias Pseudoaleatorias generadas mediante LFSR con Realimentación Dinámica (DLFSR). In: Proceedings of XVIII Simposium Nacional de la URSI, A Coruña, Spain (2003)
[28]
Menezes A.J., Van Oorschot P.C., and Vanstone S.A. Handbook of Applied Cryptography 1996 Boca Raton CRC Press
[29]
Mita R., Palumbo G., Pennisi S., and Poli M. Pseudorandom bit generator based on dynamic linear feedback topology Electronic Letters 2002 28 19 1097-1098
[30]
National Institute of Standards and Technology. NIST Statistical Test, http://csrc.nist.gov/rng/
[31]
Robshaw M. and Billet O. New Stream Cipher Designs 2008 Heidelberg Springer
[32]
Khazaei S., Fischer S., and Meier W. Vaudenay S. Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers Progress in Cryptology – AFRICACRYPT 2008 2008 Heidelberg Springer 236-245
[33]
Simpson L.R., Dawson E., Golic J., and Millan W. Stinson D.R. and Tavares S. LILI Keystream Generator Selected Areas in Cryptography 2001 Heidelberg Springer 248-261
[34]
Soriano M. Stream ciphers based on NLFSR Proceedings of SBT/IEEE International Telecommunications Symposium 1998 1998 Los Alamitos IEEE 528-533
[35]
Vielhaber, M.: Breaking ONE.FIVIUM by AIDA an Algebraic IV Differential Attack, Cryptology ePrint archive, report 2007/413 (2007)

Cited By

View all
  • (2023)A Novel Image Encryption Technique Using Modified Grain-128Machine Learning for Networking10.1007/978-3-031-59933-0_16(232-249)Online publication date: 28-Nov-2023
  • (2017)A novel approach based on stream cipher for selective speech encryptionInternational Journal of Speech Technology10.1007/s10772-017-9439-820:3(685-698)Online publication date: 1-Sep-2017
  • (2015)Correlation Immunity of Boolean FunctionsProceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation10.1145/2739480.2754764(1095-1102)Online publication date: 11-Jul-2015
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
Information and Communications Security: 11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings
Dec 2009
515 pages
ISBN:978-3-642-11144-0
DOI:10.1007/978-3-642-11145-7
  • Editors:
  • Sihan Qing,
  • Chris J. Mitchell,
  • Guilin Wang

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 14 December 2009

Author Tags

  1. Boolean Function
  2. Initialisation Vector
  3. Stream Cipher
  4. Algebraic Immunity
  5. Algebraic Attack

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2023)A Novel Image Encryption Technique Using Modified Grain-128Machine Learning for Networking10.1007/978-3-031-59933-0_16(232-249)Online publication date: 28-Nov-2023
  • (2017)A novel approach based on stream cipher for selective speech encryptionInternational Journal of Speech Technology10.1007/s10772-017-9439-820:3(685-698)Online publication date: 1-Sep-2017
  • (2015)Correlation Immunity of Boolean FunctionsProceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation10.1145/2739480.2754764(1095-1102)Online publication date: 11-Jul-2015
  • (2015)Slide attack on standard stream cipher Enocoro-80 in the related-key chosen IV settingPervasive and Mobile Computing10.1016/j.pmcj.2015.08.00224:C(224-230)Online publication date: 1-Dec-2015
  • (2014)S-box, SET, MatchProceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Securing the Internet of Things - Volume 850110.1007/978-3-662-43826-8_10(140-149)Online publication date: 2-Jul-2014

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media