Understanding the ZK-Crypts ─ Ciphers for (Almost) all Reasons

نویسندگان

  • Carmi Gressel
  • Orr Dunkelman
  • Avi Hecht
چکیده

The ZK-Crypt combination compact hardware stream cipher engines each include a true random number generator, a stream cipher and a data authenticator based on a fast compact engine and proven "noise sources". The ZK-Crypt II 7.0 K gate and ZK-Crypt 8.2 K gate "engines" output a 32 bit word at each clock cycle with 128 and 160-bit keys, maximizing throughput with very low energy per enciphered bit. The ZK-Crypt II and the enhanced ZK-Crypt III are stream cipher and MAC un-reinstated 2nd phase candidates for the eSTREAM contest. The ZK-Crypt III with Dual Track feedback provably obviates insertion of false Message Words and next step reconciliation of invalidated machine variables in Data Authentication. The ZK-Crypt Stream Ciphers, if selected, are unencumbered eSTREAM devices.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On ZK-Crypt, Book Stack, and Statistical Tests

The algorithms submitted to the ECRYPT Stream Cipher Project (eSTREAM) were tested using the recently suggested statistical test named “Book Stack”. All the ciphers except ZK-Crypt have passed the tests. The paper briefly describes the essence of the test. Computer implementation of the test in C++ language is supplied.

متن کامل

Heterogeneity of the Level of Activity of Lgr5+ Intestinal Stem Cells

Intestinal stem cells (ISCs) are a group of rare cells located in the intestinal crypts which are responsible for the maintenance of the intestinal homeostasis and intestinal regeneration following injury or inflammation. Lineage tracing experiments in mice have proven that ISCs can repopulate the entire intestinal crypt. It is noteworthy that in such experiments, only a subset of intestinal cr...

متن کامل

A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study

In this paper we propose a new method for applying hiding countermeasure against CPA attacks. This method is for software implementation, based on smoothing power consumption of the device. This method is evaluated on the SIMON scheme as a case study; however, it is not relying on any specific SIMON features. Our new method includes only AND equivalent and XOR equivalent operations since every ...

متن کامل

Stream ciphers and the eSTREAM project

Stream ciphers are an important class of symmetric cryptographic algorithms. The eSTREAM project contributed significantly to the recent increase of activity in this field. In this paper, we present a survey of the eSTREAM project. We also review recent time/memory/data and time/memory/key trade-offs relevant for the generic attacks on stream ciphers.

متن کامل

Ciphers for MPC and FHE1

Designing an efficient cipher was always a delicate balance between linear and nonlinear operations. This goes back to the design of DES, and in fact all the way back to the seminal work of Shannon. Here we focus, for the first time, on an extreme corner of the design space and initiate a study of symmetric-key primitives that minimize the multiplicative size and depth of their descriptions. Th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007