DRACO Stream Cipher
نویسندگان
چکیده
Stream ciphers are vulnerable to generic time-memory-data tradeoff attacks. These attacks reduce the security level half of cipher’s internal state size. The conventional way handle this vulnerability is design cipher with an twice as large desired level. In lightweight cryptography and heavily resource constrained devices, a size big drawback for cipher. This principle can be found in eSTREAM portfolio members Grain Trivium.Recently proposals have been made that distinguish between volatile non-volatile state. part would typically updated during update while remained constant. Cipher like Sprout, Plantlet, Fruit Atom reuse secret key However, when considering indistinguishability none mentioned above provides beyond birthday bound regard Partially due lack proper proof security.We present new stream proposal called Draco which implements construction scheme CIVK. contrast above, CIVK uses initial value prefix its builds upon 128-bit 96-bit requires 23 % less area 31 power than Grain-128a at 10 MHz. Further, we full length against distinguishing makes suitable choice ultra-lightweight devices RFID tags.
منابع مشابه
A Stream Cipher Based on Chaotic Permutations
In this paper we introduce a word-based stream cipher consisting of a chaotic part operating as a chaotic permutation and a linear part, both of which designed on a finite field. We will show that this system can operate in both synchronized and self-synchronized modes. More specifically, we show that in the self-synchronized mode the stream cipher has a receiver operating as an unknown input o...
متن کاملThe rakaposhi Stream Cipher
In this paper, we introduce the rakaposhi stream cipher. The algorithm is based on Dynamic Linear Feedback Shift Registers, with a simple and potentially scalable design, and is particularly suitable for hardware applications with restricted resources. The rakaposhi stream cipher offers 128-bit security, and aims to complement the current eSTREAM portfolio of hardware-oriented stream ciphers.
متن کاملThe Stream Cipher Rabbit
1 This is version 1.1 of the cipher specification as submitted to the eStream project. The only changes in comparison to version 1.0 are some additions to section 7 on computational efficiency and a new appendix A, which describes an 80-bit key setup.
متن کاملStream Cipher HC - 256 ?
HC-256 is a software-efficient stream cipher. It generates keystream from a 256-bit secret key and a 256-bit initialization vector. The encryption speed of the C implementation of HC-256 is about 1.9 bits per clock cycle (4.2 cycles/byte) on the Intel Pentium 4 processor.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IACR transaction on symmetric cryptology
سال: 2022
ISSN: ['2519-173X']
DOI: https://doi.org/10.46586/tosc.v2022.i2.1-42