Mersenne Twister and Fubuki Stream/block Cipher
نویسندگان
چکیده
We propose two stream ciphers based on a non-secure pseudorandom number generator (called the mother generator). The mother generator is here chosen to be the Mersenne Twister (MT), a widely used 32-bit integer generator having 19937 bits of internal state and period 219937 − 1. One proposal is CryptMT, which computes the accumulative product of the output of MT, and use the most significant 8 bits as a secure random
منابع مشابه
Cryptographic Mersenne Twister and Fubuki Stream/block Cipher
We propose two stream ciphers based on a non-secure pseudorandom number generator (called the mother generator). The mother generator is here chosen to be the Mersenne Twister (MT), a widely used 32-bit integer generator having 19937 bits of internal state and period 219937 − 1. One proposal is CryptMT, which computes the accumulative product of the output of MT, and use the most significant 8 ...
متن کاملCryptanalysis of Cryptmt: Effect of Huge Prime Period and Multiplicative Filter
CryptMT (Cryptographic Mersenne Twister) is an 8-bit pseudorandom integer generator for a stream cipher. It combines an F2-linear generator of period 219937 − 1 and a multiplicative filter with 32-bit memory. We analyze its security against some standard cryptanalytic attacks for filter generators. It is proved that CryptMT has strong resistance against them: CryptMT has a period of 219937 − 1,...
متن کاملComparison of 256-bit stream ciphers
This paper evaluates and compares several stream ciphers that use 256-bit keys: counter-mode AES, CryptMT, DICING, Dragon, Fubuki, HC-256, Phelix, Py, Py6, Salsa20, SOSEMANUK, VEST, and YAMB.
متن کاملAn Overview of Cryptographic Hash Functions
This report gives a survey on cryptographic hash functions. It gives an overview of different types of hash functions and reviews design principles. It also focuses on keyed hash functions and suggests some applications and constructions of keyed hash functions. We have used hash (keyed) function for authenticating messages encrypted using Rijndael [1] block cipher. Moreover, a parallel message...
متن کاملComparison of 256-bit stream ciphers at the beginning of 2006
This paper evaluates and compares several stream ciphers that use 256-bit keys: counter-mode AES, CryptMT, DICING, Dragon, FUBUKI, HC-256, Phelix, Py, Py6, Salsa20, SOSEMANUK, VEST, and YAMB.
متن کامل