ABC: A New Fast Flexible Stream Cipher Specification
نویسندگان
چکیده
ABC is a synchronous stream cipher optimized for software applications. Its design offers large flexibility concerning key material usage and memory consumption. Here we present a version of ABC with a 128-bit key and a 128-bit IV, a 32-bit non-linear filter, flexible key expansion, flexible and fast IV setup procedures, and variable memory requirements. Corresponding author Partially supported by the Institute for Experimental Mathematics, University of Duisburg-Essen, Germany Implementation for 8-bit processor
منابع مشابه
ABC: A New Fast Flexible Stream Cipher
ABC is a synchronous stream cipher optimized for software applications. Its key length is 128 bits. It accommodates a 128-bit initial vector. Here a version of ABC with a 128-bit key and 32-bit internal variables is presented. A new approach to the design of stream ciphers has been used which results in a cipher based upon keyand clock-dependent state transition and filter functions. More preci...
متن کاملCryptanalysis of the Stream Cipher ABC v2
ABC v2 is a software-efficient stream cipher with 128-bit key. In this paper, we apply a fast correlation attack to break ABC v2 with weak keys. There are about 2 weak keys in ABC v2. The complexity to identify a weak key and to recover the internal state of a weak key is low: identifying one weak key from about 2 random keys requires 6460 keystream bytes and 2 operations for each random key. R...
متن کاملA New Type of Cipher: DICING_csb
In this paper, we will propose a new type of cipher named DICING_csb, which is derived from our previous stream cipher DICING. It has applied a stream of subkey and an encryption form of block ciphers, so it may be viewed as a combinative of stream cipher and block cipher. Hence, the new type of cipher has fast rate like a stream cipher and need no MAC. .
متن کاملCryptanalysis of ABC v2
ABC v2 is a stream cipher with 128-bit key. In this paper, we show that there are about 2 weak keys. The complexity to identify each weak key and to recover the internal state is low. To identify a weak key from about 2 random keys, we need 2 keystream bytes from each key, and 2 operations are required for each keystream. Recovering the internal state of a weak key requires about 2 keystream by...
متن کاملDivide and Conquer Attack on ABC Stream Cipher
Abstract ABC is a synchronous stream proposed as a candidate to ECRYPT Project. ABC gets a 128-bit key and a 128-bit IV and produces 1195 bits as the internal state of the cipher. Using some statistical simulations we show that one of the ABC components, a key-IV dependent function over GF(2) called C which is chosen randomly from a family of functions, is slightly better than a randomly chosen...
متن کامل