Scream: A Software-Efficient Stream Cipher
نویسندگان
چکیده
We report on the design of Scream, a new software-efficient stream cipher, which was designedto be a “more secure SEAL”. Following SEAL, the design of Scream resembles in many ways ablock-cipher design. The new cipher is roughly as fast as SEAL, but we believe that it offers asignificantly higher security level. In the process of designing this cipher, we re-visit the SEALdesign paradigm, exhibiting some tradeoffs and limitations.
منابع مشابه
Some Words on Cryptanalysis of Stream Ciphers
I the world of cryptography, stream ciphers are known as primitives used to ensure privacy over a communication channel. One common way to build a stream cipher is to use a keystream generator to produce a pseudorandom sequence of symbols. In such algorithms, the ciphertext is the sum of the keystream and the plaintext, resembling the one-time pad principal. Although the idea behind stream ciph...
متن کاملCryptanalysis of Stream Ciphers with Linear Masking
We describe a cryptanalytical technique for distinguishing some stream ciphers from a truly random process. Roughly, the ciphers to which this method applies consist of a “non-linear process” (say, akin to a round function in block ciphers), and a “linear process” such as an LFSR (or even fixed tables). The output of the cipher can be the linear sum of both processes. To attack such ciphers, we...
متن کاملImplementation of the SCREAM Tweakable Block Cipher in MSP430 Assembly Language
The encryption mode of the Tweakable Block Cipher (TBC) of the SCREAM Authenticated Cipher is implemented in the MSP430 microcontroller. Assembly language versions of the TBC are prepared using both precomputed tweak keys and tweak keys computed “on-the-fly.” Both versions are compared against published results for the assembly language version of SCREAM on the ATMEL AVR microcontroller, and ag...
متن کاملStream Cipher HC - 256 ?
HC-256 is a software-efficient stream cipher. It generates keystream from a 256-bit secret key and a 256-bit initialization vector. The encryption speed of the C implementation of HC-256 is about 1.9 bits per clock cycle (4.2 cycles/byte) on the Intel Pentium 4 processor.
متن کاملA Stream Cipher Based on Chaotic Permutations
In this paper we introduce a word-based stream cipher consisting of a chaotic part operating as a chaotic permutation and a linear part, both of which designed on a finite field. We will show that this system can operate in both synchronized and self-synchronized modes. More specifically, we show that in the self-synchronized mode the stream cipher has a receiver operating as an unknown input o...
متن کامل