Binary Additive Counter Stream Ciphers
نویسندگان
چکیده
Although a number of block ciphers have been designed and are available in the public domain, they are usually used in one of the four modes: the cipher block chaining mode, the cipher feedback mode, the output feedback mode, and the counter mode. In all these cases, a stream cipher is actually used, as any block cipher used in any of these modes becomes a stream cipher. Stream ciphers are preferred, as they can destroy statistical properties of natural languages to some extent. The objective of this paper is to provide the state-of-the-art of a special type of stream ciphers, called binary additive counter stream ciphers, by surveying known results in the literature, deriving design criteria, and presenting experimental results. Two examples of binary additive counter stream ciphers are analysed in details, and are used to illustrate that it is possible to construct a practical stream cipher with many security properties. The security of the two ciphers with respect to known plaintext attacks is proven to be equivalent to the computational complexity of two number-theoretic problems. This is the first time that the security of a cipher with respect to known plaintext attacks is proved to be equivalent to the computational complexity of a mathematical problem. 2000 Mathematics Subject Classification: 11T71, 68P25, 94A55, 94A60.
منابع مشابه
The Differential Cryptanalysis and Design of Natural Stream Ciphers
This paper introduces the differential cryptanalysis of additive stream ciphers, and develops its theoretical basis. The relationships between differential and other types of stream cipher analysis are presented. The conservation laws of patterns and of mutual information are derived. The cryptographic significance of pattern distribution of keystream sequences is shown. The cryptographic trans...
متن کاملA General Encryption Scheme Based on MDS Code ( Extended Summary )
Many applications, such as wireless communications, high speed multimedia data streaming systems and sensor networks, call for strong ciphers with low computation complexity and high speed in encryption and decryption. Additive stream ciphers usually have lower computation complexity and thus provide higher encryption/decryption speed than block ciphers. An additive stream cipher usually encryp...
متن کاملStream ciphers and the eSTREAM project
Stream ciphers are an important class of symmetric cryptographic algorithms. The eSTREAM project contributed significantly to the recent increase of activity in this field. In this paper, we present a survey of the eSTREAM project. We also review recent time/memory/data and time/memory/key trade-offs relevant for the generic attacks on stream ciphers.
متن کاملLinearisation Attacks on FCSR-based Stream Ciphers
This paper presents a new class of cryptanalytic attacks, which are applicable against those binary additive synchronous stream ciphers, whose analysis theory is based on the properties of 2-adic numbers. These attacks are named as ‘Linearisation Attacks’. Linearisation attacks consist of three variants, which are referred as ‘Conventional Linearisation Attacks (CLAs)’, ‘Fast Linearisation Atta...
متن کاملComparison of 256-bit stream ciphers
This paper evaluates and compares several stream ciphers that use 256-bit keys: counter-mode AES, CryptMT, DICING, Dragon, Fubuki, HC-256, Phelix, Py, Py6, Salsa20, SOSEMANUK, VEST, and YAMB.
متن کامل