Some Thoughts about Implementation Properties of Stream Ciphers
نویسندگان
چکیده
This contribution describes general considerations for evaluating the quality of a cryptographic implementation, with a strong focus on hardware implementation of stream ciphers. In particular, the features area efficiency, power, and secure implementation are discussed. Even though the main target of the treatment here are stream ciphers, some of the thoughts presented are directly applicable to other crypto algorithms such as block ciphers.
منابع مشابه
Stream ciphers and the eSTREAM project
Stream ciphers are an important class of symmetric cryptographic algorithms. The eSTREAM project contributed significantly to the recent increase of activity in this field. In this paper, we present a survey of the eSTREAM project. We also review recent time/memory/data and time/memory/key trade-offs relevant for the generic attacks on stream ciphers.
متن کاملn-QUASIGROUP CRYPTOGRAPHIC PRIMITIVES: STREAM CIPHERS
In this paper we present two new n-quasigroup stream ciphers based on new n-quasigroup encryption scheme. Also, we present a practical implementation of these ciphers that has very good cryptographic properties. The implementation is based on a design concept of mixing two ”incompatible” group operations on the set Z28 .
متن کاملChaotic versus Classical Stream Ciphers – a Comparative Study
Chaotic and classical (binary) stream ciphers are compared with respect to their cryptographical properties. Possible synchronization schemes, algebraic and analytical properties as well as design and implementation aspects are discussed. For two example classes with similar system structures it is shown that chaotic stream ciphers can achieve a higher level of complexity than classical binary ...
متن کاملThe Shrinking Generator: Some Practical Considerations
The Shrinking Generator, presented at Crypto'93, is a LFSR-based pseudorandom generator suitable for the implementation of additive stream ciphers. It is particularly simple and has attractive security properties. (The reader is referred to [1] for the definition of the generator and its properties). Although the algorithm was originally intended for hardware implementation, here we will focus ...
متن کاملDesign of Stream Ciphers and Cryptographic Properties of Nonlinear Functions
Block and stream ciphers are widely used to protect the privacy of digital informa-tion. A variety of attacks against block and stream ciphers exist; the most recentbeing the algebraic attacks. These attacks reduce the cipher to a simple algebraicsystem which can be solved by known algebraic techniques. These attacks havebeen very successful against a variety of stream ciphers a...
متن کامل