Adding MAC functionality to Edon80
نویسندگان
چکیده
In this paper we show how the synchronous stream cipher Edon80 proposed as a candidate stream cipher in Profile 2 of the eSTREAM project, can be efficiently upgraded to synchronous stream cipher with authentication. We are achieving that by simple addition of two-bit registers into the e-transformers of Edon80 core, an additional 160-bit shift register and by putting additional communication logic between neighboring e-transformers of the Edon80 pipeline core. This upgrade does not change the produced keystream from Edon80 and we project that in total it will need not more then 1500 gates.
منابع مشابه
A Note on Algebraic Properties of Quasigroups in Edon80
Stream cipher Edon80 [6] is one of the submissions to the ECRYPT Stream Cipher Project eSTREAM that passed to the Phase II of this project. The core of this cipher is based on pipelined quasigroup transformations using the so called e-transformers [6]. We study algebraic properties of the suggested quasigroups for use in the stream cipher Edon80 and prove that all the suggested quasigroups for ...
متن کاملA note on the Edon80 S-box
Edon80 [1] is one of the Phase 3 candidates in eSTREAM, the ECRYPT stream cipher project. This note examines the structure of the Edon80 quasigroup permutation, when viewed as an S-box or a pair of boolean functions. Although some interesting relations are found, we have not been able to apply these to attack the full cipher.
متن کاملUnderstanding Periods in Edon80 - Response on Remarks on the Period of Edon80, by Jin Hong -
In this note we responde to the remarks of Jin Hong given in [1] regarding our stream cipher Edon80 [2]. Our mathematical understanding of the periods of streams that are produced by Edon80 is now much deeper then in the time of the design of the cipher. According to that mathematical knowledge, we discuss two scenarios how to deal with the further treatment concerning Edon80 submission to ECRY...
متن کاملA Key Recovery Attack on Edon80
Edon80 is a recent stream cipher design that has advanced to the third and last phase of the eSTREAM project. It has remained unbroken and untweaked since it was designed and submitted to eSTREAM. It is now one of the 8 nal hardware candidates. In this paper we cryptanalyze the cipher by describing a key recovery attack. The complexity of the attack is around 2 simple operations for a keystream...
متن کاملCore Role Based Access Control (RBAC) mechanism for MySQL
RBAC or Role-Based Access Control is an approach to restrict system access to authorized users and help in implementing a secure access control for larger databases. MySQL is a popular open source relational database management system (RDBMS) which currently implements MAC and DAC access control mechanisms. We extend the access control policies in MySQL by adding the Core RBAC functionality to it.
متن کامل