A New 128-bit Key Stream Cipher LEX

نویسنده

  • Alex Biryukov
چکیده

A proposal for a simple AES-based stream cipher which is at least 2.5 times faster than AES both in software and in hardware.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of Ciphers Based on AES Structure

AES is the best known and most widely used block cipher. Its three versions (AES-128, AES-192, and AES-256) differ in their key sizes (128 bits, 192 bits and 256 bits) and in their number of rounds (10, 12, and 14, respectively). Our present work investigates the recently reported attacks on AES 256 and AES 192. Instead of concentrating on the actual algorithms of these attacks we shall be more...

متن کامل

ABC: A New Fast Flexible Stream Cipher Specification

ABC is a synchronous stream cipher optimized for software applications. Its design offers large flexibility concerning key material usage and memory consumption. Here we present a version of ABC with a 128-bit key and a 128-bit IV, a 32-bit non-linear filter, flexible key expansion, flexible and fast IV setup procedures, and variable memory requirements. Corresponding author Partially supported...

متن کامل

Algebraic cryptanalysis of a small-scale version of stream cipher Lex

In this paper we analyse with respect to algebraic attacks a small-scale version of the stream cipher Lex. We base it on a small-scale version of the block cipher AES with 16-bit state and 16-bit key. We represent the small-scale Lex and its key schedule in two alternative ways: as a system of cubic boolean equations and as a system of quadratic boolean equations. We use Gröbner bases to solve ...

متن کامل

How to Break Py and Pypy by a Chosen-IV Attack

Biham and Seberry have submitted the stream cipher Py and Pypy to the ECRYPT stream cipher project (eSTREAM). A key recovery attack against Py and Pypy was proposed by Wu and Preneel. In their attack, (IV sizeb − 9) bytes of the key can be recovered with (IV sizeb − 4) × 2 chosen IVs, where IV sizeb indicates the size of the IV in bytes. For a 128-bit key and a 128-bit IV, which are recommended...

متن کامل

A New Attack on the LEX Stream Cipher

In [6], Biryukov presented a new methodology of stream cipher design, called leak extraction. The stream cipher LEX, based on this methodology and on the AES block cipher, was selected to phase 3 of the eSTREAM competition. The suggested methodology seemed promising, and LEX, due to its elegance, simplicity and performance was expected to be selected to the eSTREAM portfolio. In this paper we s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005