Adding MAC functionality to Edon80

نویسندگان

  • Danilo Gligoroski
  • Svein Johan Knapskog
چکیده

In this paper we show how the synchronous stream cipher Edon80 proposed as a candidate stream cipher in Profile 2 of the eSTREAM project, can be efficiently upgraded to synchronous stream cipher with authentication. We are achieving that by simple addition of two-bit registers into the e-transformers of Edon80 core, an additional 160-bit shift register and by putting additional communication logic between neighboring e-transformers of the Edon80 pipeline core. This upgrade does not change the produced keystream from Edon80 and we project that in total it will need not more then 1500 gates.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Note on Algebraic Properties of Quasigroups in Edon80

Stream cipher Edon80 [6] is one of the submissions to the ECRYPT Stream Cipher Project eSTREAM that passed to the Phase II of this project. The core of this cipher is based on pipelined quasigroup transformations using the so called e-transformers [6]. We study algebraic properties of the suggested quasigroups for use in the stream cipher Edon80 and prove that all the suggested quasigroups for ...

متن کامل

A note on the Edon80 S-box

Edon80 [1] is one of the Phase 3 candidates in eSTREAM, the ECRYPT stream cipher project. This note examines the structure of the Edon80 quasigroup permutation, when viewed as an S-box or a pair of boolean functions. Although some interesting relations are found, we have not been able to apply these to attack the full cipher.

متن کامل

Understanding Periods in Edon80 - Response on Remarks on the Period of Edon80, by Jin Hong -

In this note we responde to the remarks of Jin Hong given in [1] regarding our stream cipher Edon80 [2]. Our mathematical understanding of the periods of streams that are produced by Edon80 is now much deeper then in the time of the design of the cipher. According to that mathematical knowledge, we discuss two scenarios how to deal with the further treatment concerning Edon80 submission to ECRY...

متن کامل

A Key Recovery Attack on Edon80

Edon80 is a recent stream cipher design that has advanced to the third and last phase of the eSTREAM project. It has remained unbroken and untweaked since it was designed and submitted to eSTREAM. It is now one of the 8 nal hardware candidates. In this paper we cryptanalyze the cipher by describing a key recovery attack. The complexity of the attack is around 2 simple operations for a keystream...

متن کامل

Core Role Based Access Control (RBAC) mechanism for MySQL

RBAC or Role-Based Access Control is an approach to restrict system access to authorized users and help in implementing a secure access control for larger databases. MySQL is a popular open source relational database management system (RDBMS) which currently implements MAC and DAC access control mechanisms. We extend the access control policies in MySQL by adding the Core RBAC functionality to it.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007