Understanding the ZK-Crypts ─ Ciphers for (Almost) all Reasons
نویسندگان
چکیده
The ZK-Crypt combination compact hardware stream cipher engines each include a true random number generator, a stream cipher and a data authenticator based on a fast compact engine and proven "noise sources". The ZK-Crypt II 7.0 K gate and ZK-Crypt 8.2 K gate "engines" output a 32 bit word at each clock cycle with 128 and 160-bit keys, maximizing throughput with very low energy per enciphered bit. The ZK-Crypt II and the enhanced ZK-Crypt III are stream cipher and MAC un-reinstated 2nd phase candidates for the eSTREAM contest. The ZK-Crypt III with Dual Track feedback provably obviates insertion of false Message Words and next step reconciliation of invalidated machine variables in Data Authentication. The ZK-Crypt Stream Ciphers, if selected, are unencumbered eSTREAM devices.
منابع مشابه
On ZK-Crypt, Book Stack, and Statistical Tests
The algorithms submitted to the ECRYPT Stream Cipher Project (eSTREAM) were tested using the recently suggested statistical test named “Book Stack”. All the ciphers except ZK-Crypt have passed the tests. The paper briefly describes the essence of the test. Computer implementation of the test in C++ language is supplied.
متن کاملHeterogeneity of the Level of Activity of Lgr5+ Intestinal Stem Cells
Intestinal stem cells (ISCs) are a group of rare cells located in the intestinal crypts which are responsible for the maintenance of the intestinal homeostasis and intestinal regeneration following injury or inflammation. Lineage tracing experiments in mice have proven that ISCs can repopulate the entire intestinal crypt. It is noteworthy that in such experiments, only a subset of intestinal cr...
متن کاملA new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study
In this paper we propose a new method for applying hiding countermeasure against CPA attacks. This method is for software implementation, based on smoothing power consumption of the device. This method is evaluated on the SIMON scheme as a case study; however, it is not relying on any specific SIMON features. Our new method includes only AND equivalent and XOR equivalent operations since every ...
متن کاملStream ciphers and the eSTREAM project
Stream ciphers are an important class of symmetric cryptographic algorithms. The eSTREAM project contributed significantly to the recent increase of activity in this field. In this paper, we present a survey of the eSTREAM project. We also review recent time/memory/data and time/memory/key trade-offs relevant for the generic attacks on stream ciphers.
متن کاملCiphers for MPC and FHE1
Designing an efficient cipher was always a delicate balance between linear and nonlinear operations. This goes back to the design of DES, and in fact all the way back to the seminal work of Shannon. Here we focus, for the first time, on an extreme corner of the design space and initiate a study of symmetric-key primitives that minimize the multiplicative size and depth of their descriptions. Th...
متن کامل