F-FCSR Stream Ciphers

نویسندگان

  • François Arnault
  • Thierry P. Berger
  • Cédric Lauradoux
چکیده

Feedback with Carry Shift Registers (FCSRs) are a promising alternative to Linear Feedback Shift Registers (LFSRs) for the design of stream ciphers. The main difference between these two automata lies in the computation of the feedback. While LFSRs use simple bitwise addition, FCSRs use addition with carries. Hence, the transition function of an FCSR is non-linear, more precisely quadratic. Since FCSRs were introduced by Goresky and Klapper [11], the properties of the sequences generated by an FCSR are now considered well mastered from a mathematical point of view. FCSR can help to solve the problem which is always raised when using LFSR. In LFSR-based stream ciphers, a filtering or combining Boolean function must be used to break the linearity of LFSR. With FCSR-based stream ciphers, this issue is directly solved by the intrinsic non-linearity of the FCSR. Thus, a linear filter can be used to extract the keystream from the internal state. Moreover, sequences obtained from an FCSR have the same suitable statistical properties of LFSR sequences: known period, balancedness, equal distribution of patterns. . . We present in this chapter two designs based on filtered FCSR (FFCSR) which are dedicated to hardware applications. F-FCSR-H is our first proposition which fulfill the requirement of eSTREAM profile 2: 80 bits of key and 80 bits of IV. A second proposition, F-FCSR-16, is similar to F-FCSR-H, but uses larger keys and IVs (128 bits for the key and 128 bits for the IV).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of Selected Stream Ciphers

T he aim of this dissertation is to show some cryptanalytical results on a selection of stream ciphers. We have grouped theory and results into three main parts. The first part focuses on the FCSR-based constructions X-FCSR and F-FCSRH v3. For the X-FCSR family of stream ciphers we perform a severe state recovery attack. This attack works for both X-FCSR-128 and X-FCSR-256. We then develop a ge...

متن کامل

F-FCSR: Design of a New Class of Stream Ciphers

In this paper we present a new class of stream ciphers based on a very simple mechanism. The heart of our method is a Feedback with Carry Shift Registers (FCSR) automaton. This automaton is very similar to the classical LFSR generators, except the fact that it performs operations with carries. Its properties are well mastered: proved period, non-degenerated states, good statistical properties, ...

متن کامل

Linearisation Attacks on FCSR-based Stream Ciphers

This paper presents a new class of cryptanalytic attacks, which are applicable against those binary additive synchronous stream ciphers, whose analysis theory is based on the properties of 2-adic numbers. These attacks are named as ‘Linearisation Attacks’. Linearisation attacks consist of three variants, which are referred as ‘Conventional Linearisation Attacks (CLAs)’, ‘Fast Linearisation Atta...

متن کامل

Breaking the F-FCSR-H Stream Cipher in Real Time

The F-FCSR stream cipher family has been presented a few years ago. Apart from some aws in the initial propositions, corrected in a later stage, there are no known weaknesses of the core of these algorithms. The hardware oriented version, called FCSR-H, is one of the ciphers selected for the eSTREAM portfolio. In this paper we present a new and severe cryptanalytic attack on the F-FCSR stream c...

متن کامل

Cryptanalysis of the F-FCSR Stream Cipher Family

This paper focuses on F-FCSR, a new family of stream ciphers proposed by Arnault and Berger at FSE 2005. It uses a non-linear primitive called the Feedback with Carry Shift Register (FCSR) as a building block. Its security relies on some properties of the 2-adic numbers. The F-FCSR family contains several stream ciphers, each of them proposing different features. First, we show a resynchronizat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008