Keystream Generator with Provable Security How to create a indistinguishable PRSG

نویسنده

  • Kefei Chen
چکیده

Introduction Pseudo-random sequence have been widely used in communication and cryptology. Any (pseudo-) random sequence used in practical system is generated by a machine, a computer or a device, those devices are called (pseudo-) random sequence generator, or PRSG PRSG may be linear feedback shift register, finite automata or some feedback mode using block cipher. Content of this slide what is the PRSG in practice what should be the PRSG in theoretic how can we create a ideal PRSG

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improved Analysis of the BMGL Keystream Generator

In this paper we give an improved security analysis of the NESSIE submission BMGL. The new analysis improves also asymptotically some of the theoretical results on which the BMGL keystream generator is based. We also give an alternative, bootstrapped version of the generator which is implementation-wise very close to the original generator and offers even stronger provable security properties.

متن کامل

Key Feedback Mode: a Keystream Generator with Provable Security

We propose a key feedback mode of operation for the AES algorithm Rijndael (or any other block cipher), giving efficient synchronous keystream generators. We show that if the block cipher possesses simple properties, normally accepted to exist in any secure block cipher, then also the generator is secure.

متن کامل

A Generalized Interface for the NESSIE Submission BMGL

In [3] a provably secure synchronous keystream generator based on the Rijndael block cipher is described. This document gives a more general interface for the cipher and investigates effects on the provable security properties.

متن کامل

BMGL: Synchronous Key-stream Generator with Provable Security (Revision 1)

We propose a construction of an efficient, synchronous keystream generator with provable security properties in response to the NESSIE call for primitives. The cryptographic core of the stream cipher is the block cipher Rijndael. We show that a non-trivial attack on the cipher reduces to an attack on Rijndael. The construction uses an optimization of earlier work on pseudorandom generators by B...

متن کامل

Stream Cipher Operation Modes with Improved Security against Generic Collision Attacks

Most stream ciphers used in practice are vulnerable against generic collision attacks, which allow to compute the secret initial state on the basis of O(2) keystream bits in time and space O(2), where n denotes the inner state length of the underlying keystream generator. This implies the well-known rule that for reaching n-bit security, the inner state length should be at least 2n. Correspondi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007