The Stream Cipher Polar Bear

نویسندگان

  • Johan H̊astad
  • Mats Näslund
چکیده

We propose a new stream cipher called “Polar Bear”. It combines constructions used successfully in other situations. The key initialization uses Rijndael, the steady state uses a dynamic table as in RC4 and we guarantee a long period through the use of a linear feedback shiftregister. The efficiency for short messages is better than that of RC4 while for long messages Polar Bear is about a factor two behind in efficiency. On the other hand, we believe our construction has a larger safety margin compared to RC4.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Version of the Stream Cipher Polar Bear

In April 2005, the stream cipher Polar Bear was proposed as a response to the eSTREAM Call for Primitives. Since then, a few attacks, [7] and [5], have indicated certain weaknesses in the design. In this paper we propose a new version of Polar Bear, called Polar Bear 2.0. The main difference is a key-dependent premixing of the D8 table in conjunction with the key schedule. The new version does ...

متن کامل

A Critique of BEAR and LION

The paper \Two Practical and Provably Secure Block Ciphers: BEAR and LION" AnBi96] by Ross Anderson and Eli Biham is summarized. The paper presents two new block ciphers (BEAR and LION) which can be built using a hash function and a stream cipher. Both these ciphers are provably secure in that a successful attack on them can be used as an attack on the underlying hash function and stream cipher...

متن کامل

A Stream Cipher Based on Chaotic Permutations

In this paper we introduce a word-based stream cipher consisting of a chaotic part operating as a chaotic permutation and a linear part, both of which designed on a finite field. We will show that this system can operate in both synchronized and self-synchronized modes. More specifically, we show that in the self-synchronized mode the stream cipher has a receiver operating as an unknown input o...

متن کامل

Two Practical and Provably Secure Block Ciphers: BEAR and LION

In this paper we suggest two new provably secure block ciphers , called BEAR and LION. They both have large block sizes, and are based on the Luby-Rackoo construction. Their underlying components are a hash function and a stream cipher, and they are provably secure in the sense that attacks which nd their keys would yield attacks on one or both of the underlying components. They also have the p...

متن کامل

Provably Secure and E cient Block Ciphers

The security and eciency of two recently proposed block ciphers, bear and lion, both based on a hash function and a stream cipher, is discussed. Meet-in-the-middle attacks are presented which can be used to dramatically reduce the complexity of a brute-force key search on both these ciphers. A new block cipher is described which is not susceptible to meet-in-the-middle attacks, is provably secu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005