ABC: a New Fast Flexible Stream Cipher

Total Page:16

File Type:pdf, Size:1020Kb

ABC: a New Fast Flexible Stream Cipher ABC: A New Fast Flexible Stream Cipher Specification Version 2 Vladimir Anashin∗, Andrey Bogdanovy, Ilya Kizhvatov Faculty of Information Security Institute for Information Sciences and Security Technologies Russian State University for the Humanities anashin,bogdanov,kizhvatov @rsuh.ru f g Sandeep Kumar z Communication Security Group (COSY) Department of Electrical Engineering and Information Sciences Ruhr-University Bochum [email protected] Introduction ABC is a synchronous stream cipher optimized for software applications. Its design offers large flexibility concerning memory consumption. Here a version of ABC with a 128-bit key and 32-bit internal variables is presented. ∗Corresponding author yPartially supported by the Institute for Experimental Mathematics, University of Duisburg-Essen, Germany zImplementation for 8-bit processor 1 ABC: A new fast flexible stream cipher A new approach to the stream cipher design has been used which results in a cipher based upon key- and clock-dependent state transition and filter functions. Our techniques guarantee the period of 232 (2127 1) words · − (the longest of possible), uniform distribution, and high linear complexity of the keystream of ABC. The ABC stream cipher offers a security level of 2128. No hidden weak- nesses have been incorporated in the design of ABC. No weaknesses of the design with respect to standard cryptanalytic attacks have been found. ABC can be efficiently implemented in software. Our C implementation provides the throughput of about 7 Gbps on a standard 3.2 GHz Pentium 4 processor. The flexibility property results in the possibility of its efficient application on almost every platform by choosing proper implementation parameters. 1 Variables and basic operations In the description of cryptographic primitives and in the specification of ABC one rests upon some variables which change at each step of computa- tions: x is a 32-bit integer value and can be represented in different ways: 31 i 32 x = (x ; : : : ; x ) = xi2 Z=2 Z, xi 0; 1 ; i = 0; : : : ; 31; 31 0 i=0 2 2 f g w x = (x^t 1; : : : ; x^0), x^i Z=2 Z, i = 0; : : : ; t 1, w Z, w 32, − P 2 − 2 j t = 32=w Z; 2 x V = GF(2)32; 2 32 y is a 32-bit integer value, one way of representing it being used only: 31 i 32 y = (y ; : : : ; y ) = yi2 Z=2 Z, yi 0; 1 ; i = 0; : : : ; 31; 31 0 i=0 2 2 f g z is a 128-bit integer valueP and allows several equivalent representations too: 127 i 128 z = (z ; : : : ; z ) = zi2 Z=2 Z, zi 0; 1 ; i = 0; : : : ; 127; 127 0 i=0 2 2 f g z V = GF(2)128; 2 128 P z = (z¯ ; z¯ ; z¯ ; z¯ ) (Z=232Z)4, z¯ ; z¯ ; z¯ ; z¯ Z=232Z. 3 2 1 0 2 3 2 1 0 2 x and z represent the current internal state of the cipher. The initial values of x and z are defined in the course of the initialization stage. y denotes the 32-bit output of the keystream generator. Moreover, ABC uses some further variables that are calculated from the key and initial value at the initialization stage by applying a special key expansion routine: 2 ABC: A new fast flexible stream cipher e; e ; : : : ; e Z=232Z are 32-bit integer values; 0 31 2 32 d = (d ; ; : : : ; d ; ); d = (d ; ; : : : ; d ; ) d = (d ; ; : : : ; d ; ) Z=2 Z 0 0 31 0 0 1 1 31 1 0 2 2 31 2 0 2 are 32-bit integer values. 31 Having been defined once, the variables d , d , d , e and ei remain 0 1 2 f gi=0 unchanged during the whole subsequent encryption stage as distinct from x and z. In the description of cryptographic primitives we will also require a 32-bit integer ζ Z=232Z for storing intermediate computation results. 2 To describe some optimization techniques need an auxiliary w-bit integer variable j Z=2wZ will be needed: 2 w 1 i Z wZ j = (jw 1; : : : ; j0) = i=0− ji2 =2 , ji 0; 1 ; i = 0; : : : ; w 1. − 2 2 f g − Finally, in the descriptionP of operations below two 32-bit integer variables are required: 32 a = (a ; : : : ; a ); b = (b ; : : : ; b ) Z=2 Z; ai; bi 0; 1 ; i = 0; : : : ; 31; 31 0 31 0 2 2 f g for representing operands of some operators. The ABC cipher requires the following operations for its specification: Addition modulo 232, +, represents an ordinary arithmetic addition of 2 operands in Z=232Z as 32-bit integers; Bitwise addition modulo 2, XOR, defines a binary addition of 2 operands in V32, or bitwise exclusive 'OR' of 2 32-bit integer operands as follows: a XOR b = (a b ; : : : ; a b ); 31 ⊕ 31 0 ⊕ 0 where 0; if ai = bi, ai bi = ⊕ (1; otherwise; Bitwise multiplication modulo 2, AND, defines a bitwise 'AND' of 2 32-bit integer operands as follows: a AND b = (a b ; : : : ; a b ); 31 ^ 31 0 ^ 0 where 1; if ai = bi = 1, ai bi = ^ (0; otherwise; Bitwise disjunction, OR, defines a bitwise inclusive 'OR' of 2 32-bit integer operands as follows: a OR b = (a b ; : : : ; a b ); 31 _ 31 0 _ 0 3 ABC: A new fast flexible stream cipher where 0; if ai = bi = 0, ai bi = _ (1; otherwise; The i-th bit selection, δi( ), determines the i-th bit of a 32- or 128-bit · integer number and can be described in the following way as applied to respectively x, z, d1 and j: 32 δi : Z=2 Z 0; 1 , δi(x) = xi, i = 0; : : : ; 31, ! f g 128 δi : Z=2 Z 0; 1 , δi(z) = zi, i = 0; : : : ; 127, ! f g 32 δi : Z=2 Z 0; 1 , δi(d ) = d ;i, i = 0; : : : ; 31, ! f g 1 1 w δi : Z=2 Z 0; 1 , δi(j) = ji, i = 0; : : : ; w 1; ! f g − Bit substring selection, [ ]v , denotes a substring of bits in positions from u · u to v, u; v Z=25Z, in the binary expansion of a 32-bit integer number 2 and is defined as follows: v [a]u = (δv(a); : : : ; δu(a)) = (av; : : : ; au); u < v; for example, a = 000000000000000100000000001110102 ; 16 [a]1 = 10000000000111012 ; Right shift, c, denotes right zero-fill bit shift of binary expansion of a · 32-bit integer number by c bits, c Z=25Z, and can be described as 2 follows: a c = (0; : : : ; 0; a ; : : : ; ac); 31 c Left shift, c, denotes left zero-fill| bit{z shift} of binary expansion of a 32-bit · integer number by c bits, c Z=25Z, and can be described as follows: 2 a c = (a31 c; : : : ; a0; 0; : : : ; 0); − c | {z } Right rotation, o c, denotes right bitwise rotation of binary expansion of · a 32-bit integer number by c bits, c Z=25Z, and can be described as 2 follows: a o c = (ac 1; : : : ; a0; a31; : : : ; ac): − 4 ABC: A new fast flexible stream cipher 2 Primitives ABC uses 3 main primitives (A, B and C respectively): A: Z=2128Z Z=2128Z is a linear feedback shift register of length 128 ! (LFSR), z representing its state; B: Z=232Z Z=232Z represents a single cycle mapping based on arith- ! metical addition in Z=232Z and bitwise addition modulo 2 (XOR), trans- forming x; C: Z=232Z Z=232Z specifies a filter function based on lookup tables, ! arithmetical addition in Z=232Z and right bitwise rotation (o), as- suming x as argument and delivering y. A: Linear feedback shift register, counter 128 A is a linear transformation of the vector space V128 = GF(2) , z = A(z), and is defined by a LFSR. Since bit operations are relatively slow on general purpose processors, a word oriented representation of the LFSR is used. It is of length 128 and its characteristic polynomial is φ(θ) = (θ)θ , where (θ) = θ127 + θ63 + 1 is primitive. Moreover, as in [10] the next 32 bits are produced at once, which is done as follows: ζ z¯ XOR(z¯ 31) XOR(z¯ 1) mod 232; 2 1 0 z¯ z¯ ; 0 1 z¯ z¯ ; (1) 1 2 z¯ z¯ ; 2 3 z¯ ζ: 3 It is important to stress here that the above representation is just another (word-oriented) representation of the 127-bit LFSR with primitive polyno- mial (θ). Two outputs from this LFSR are obtained, the first one for the state transition procedure and the second one for updating the output function. Thus, the cycle length of this LFSR is 2127 1, and not 2128 1. − − This also leads to the fact that the cycle length becomes 1 in case the initial state z = (z¯3; z¯2; z¯1; z¯0) of A is either (0; 0; 0; 0) or (0; 0; 0; 1). This danger is eliminated by forcing δ1(z) to 1 in the ABC key setup and IV setup procedures, thus reducing the secret state of A primitive to 126 bits. B: Single cycle function, state transition The single cycle function B used in the ABC cipher can be specified through the following equation: 32 B(x) = ((x XOR d0) + d1) XOR d2 mod 2 ; (2) 5 ABC: A new fast flexible stream cipher where d ; d ; d Z=232Z, d 0 (mod 4), d 1 (mod 4), d 0 0 1 2 2 0 ≡ 1 ≡ 2 ≡ (mod 4). In other words, the following equations should hold simultane- ously: d0;0 = d0;1 = 0; 8d1;0 = 1; d1;1 = 0; (3) > <d2;0 = d2;1 = 0: These restrictions guaran:> tee that B is a single cycle map modulo 232, see Corollary 1 in Appendix A.
Recommended publications
  • A Uniform Framework for Cryptanalysis of the Bluetooth E0
    1 A Uniform Framework for Cryptanalysis of the Bluetooth E0 Cipher Ophir Levy and Avishai Wool School of Electrical Engineering, Tel Aviv University, Ramat Aviv 69978, ISRAEL. [email protected], [email protected] . Abstract— In this paper we analyze the E0 cipher, which “short key” attacks, that need at most 240 known is the encryption system used in the Bluetooth specification. keystream bits and are applicable in the Bluetooth We suggest a uniform framework for cryptanalysis of the setting; and “long key” attacks, that are applicable only E0 cipher. Our method requires 128 known bits of the if the E0 cipher is used outside the Bluetooth mode of keystream in order to recover the initial state of the LFSRs, operation. which reflects the secret key of this encryption engine. In one setting, our framework reduces to an attack of 1) Short Key Attacks: D. Bleichenbacher has shown D. Bleichenbacher. In another setting, our framework is in [1] that an attacker can guess the content of the equivalent to an attack presented by Fluhrer and Lucks. registers of the three smaller LFSRs and of the E0 − Our best attack can recover the initial state of the LFSRs combiner state registers with a probability of 2 93. Then after solving 286 boolean linear systems of equations, which the attacker can compute the the contents of the largest is roughly equivalent to the results obtained by Fluhrer and LFSR (of length 39 bit) by “reverse engineering” it Lucks. from the outputs of the other LFSRs and the combiner states. This attack requires a total of 128 bits of known I.
    [Show full text]
  • Key Differentiation Attacks on Stream Ciphers
    Key differentiation attacks on stream ciphers Abstract In this paper the applicability of differential cryptanalytic tool to stream ciphers is elaborated using the algebraic representation similar to early Shannon’s postulates regarding the concept of confusion. In 2007, Biham and Dunkelman [3] have formally introduced the concept of differential cryptanalysis in stream ciphers by addressing the three different scenarios of interest. Here we mainly consider the first scenario where the key difference and/or IV difference influence the internal state of the cipher (∆key, ∆IV ) → ∆S. We then show that under certain circumstances a chosen IV attack may be transformed in the key chosen attack. That is, whenever at some stage of the key/IV setup algorithm (KSA) we may identify linear relations between some subset of key and IV bits, and these key variables only appear through these linear relations, then using the differentiation of internal state variables (through chosen IV scenario of attack) we are able to eliminate the presence of corresponding key variables. The method leads to an attack whose complexity is beyond the exhaustive search, whenever the cipher admits exact algebraic description of internal state variables and the keystream computation is not complex. A successful application is especially noted in the context of stream ciphers whose keystream bits evolve relatively slow as a function of secret state bits. A modification of the attack can be applied to the TRIVIUM stream cipher [8], in this case 12 linear relations could be identified but at the same time the same 12 key variables appear in another part of state register.
    [Show full text]
  • An Archeology of Cryptography: Rewriting Plaintext, Encryption, and Ciphertext
    An Archeology of Cryptography: Rewriting Plaintext, Encryption, and Ciphertext By Isaac Quinn DuPont A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Faculty of Information University of Toronto © Copyright by Isaac Quinn DuPont 2017 ii An Archeology of Cryptography: Rewriting Plaintext, Encryption, and Ciphertext Isaac Quinn DuPont Doctor of Philosophy Faculty of Information University of Toronto 2017 Abstract Tis dissertation is an archeological study of cryptography. It questions the validity of thinking about cryptography in familiar, instrumentalist terms, and instead reveals the ways that cryptography can been understood as writing, media, and computation. In this dissertation, I ofer a critique of the prevailing views of cryptography by tracing a number of long overlooked themes in its history, including the development of artifcial languages, machine translation, media, code, notation, silence, and order. Using an archeological method, I detail historical conditions of possibility and the technical a priori of cryptography. Te conditions of possibility are explored in three parts, where I rhetorically rewrite the conventional terms of art, namely, plaintext, encryption, and ciphertext. I argue that plaintext has historically been understood as kind of inscription or form of writing, and has been associated with the development of artifcial languages, and used to analyze and investigate the natural world. I argue that the technical a priori of plaintext, encryption, and ciphertext is constitutive of the syntactic iii and semantic properties detailed in Nelson Goodman’s theory of notation, as described in his Languages of Art. I argue that encryption (and its reverse, decryption) are deterministic modes of transcription, which have historically been thought of as the medium between plaintext and ciphertext.
    [Show full text]
  • RC4-2S: RC4 Stream Cipher with Two State Tables
    RC4-2S: RC4 Stream Cipher with Two State Tables Maytham M. Hammood, Kenji Yoshigoe and Ali M. Sagheer Abstract One of the most important symmetric cryptographic algorithms is Rivest Cipher 4 (RC4) stream cipher which can be applied to many security applications in real time security. However, RC4 cipher shows some weaknesses including a correlation problem between the public known outputs of the internal state. We propose RC4 stream cipher with two state tables (RC4-2S) as an enhancement to RC4. RC4-2S stream cipher system solves the correlation problem between the public known outputs of the internal state using permutation between state 1 (S1) and state 2 (S2). Furthermore, key generation time of the RC4-2S is faster than that of the original RC4 due to less number of operations per a key generation required by the former. The experimental results confirm that the output streams generated by the RC4-2S are more random than that generated by RC4 while requiring less time than RC4. Moreover, RC4-2S’s high resistivity protects against many attacks vulnerable to RC4 and solves several weaknesses of RC4 such as distinguishing attack. Keywords Stream cipher Á RC4 Á Pseudo-random number generator This work is based in part, upon research supported by the National Science Foundation (under Grant Nos. CNS-0855248 and EPS-0918970). Any opinions, findings and conclusions or recommendations expressed in this material are those of the author (s) and do not necessarily reflect the views of the funding agencies or those of the employers. M. M. Hammood Applied Science, University of Arkansas at Little Rock, Little Rock, USA e-mail: [email protected] K.
    [Show full text]
  • (Not) to Design and Implement Post-Quantum Cryptography
    SoK: How (not) to Design and Implement Post-Quantum Cryptography James Howe1 , Thomas Prest1 , and Daniel Apon2 1 PQShield, Oxford, UK. {james.howe,thomas.prest}@pqshield.com 2 National Institute of Standards and Technology, USA. [email protected] Abstract Post-quantum cryptography has known a Cambrian explo- sion in the last decade. What started as a very theoretical and mathe- matical area has now evolved into a sprawling research ˝eld, complete with side-channel resistant embedded implementations, large scale de- ployment tests and standardization e˙orts. This study systematizes the current state of knowledge on post-quantum cryptography. Compared to existing studies, we adopt a transversal point of view and center our study around three areas: (i) paradigms, (ii) implementation, (iii) deployment. Our point of view allows to cast almost all classical and post-quantum schemes into just a few paradigms. We highlight trends, common methodologies, and pitfalls to look for and recurrent challenges. 1 Introduction Since Shor's discovery of polynomial-time quantum algorithms for the factoring and discrete logarithm problems, researchers have looked at ways to manage the potential advent of large-scale quantum computers, a prospect which has become much more tangible of late. The proposed solutions are cryptographic schemes based on problems assumed to be resistant to quantum computers, such as those related to lattices or hash functions. Post-quantum cryptography (PQC) is an umbrella term that encompasses the design, implementation, and integration of these schemes. This document is a Systematization of Knowledge (SoK) on this diverse and progressive topic. We have made two editorial choices.
    [Show full text]
  • Modified Alternating Step Generators with Non-Linear Scrambler
    CORE brought to you by Pobrane z czasopisma Annales AI- Informatica http://ai.annales.umcs.pl Data: 04/08/2020 20:39:03 Annales UMCS Informatica AI XIV, 1 (2014) 61–74 DOI: 10.2478/umcsinfo-2014-0003 View metadata, citation and similar papers at core.ac.uk Modified Alternating Step Generators with Non-Linear Scrambler Robert Wicik1∗, Tomasz Rachwalik1†, Rafał Gliwa1‡ 1 Military Communication Institute, Cryptology Department, Zegrze, Poland Abstract – Pseudorandom generators, which produce keystreams for stream ciphers by the exclusive- or sum of outputs of alternately clocked linear feedback shift registers, are vulnerable to cryptanalysis. In order to increase their resistance to attacks, we introduce a non-linear scrambler at the output of these generators. Non-linear feedback shift register plays the role of the scrambler. In addition, we propose Modified Alternating Step Generator with a non-linear scrambler (MASG1S ) built with non-linear feedback shift register and regularly or irregularly clocked linear feedback shift registers with non-linear filtering functions. UMCS1 Introduction Pseudorandom generators of a keystream composed of linear feedback shift registers (LFSR) are basic components of classical stream ciphers. An LFSR with properly selected feedback gives a sequence of maximal period and good statistical properties but has a low linear complexity. It is vulnerable to the Berlecamp-Massey [1] algorithm and can be easily reconstructed having a short output segment. Stop and go or alternating clocking of shift registers are two of the methods to increase linear complexity of the keystream. Other techniques introduce non-linearity to the feedback or to the output of the shift register.
    [Show full text]
  • Hardware Implementation of the Salsa20 and Phelix Stream Ciphers
    Hardware Implementation of the Salsa20 and Phelix Stream Ciphers Junjie Yan and Howard M. Heys Electrical and Computer Engineering Memorial University of Newfoundland Email: {junjie, howard}@engr.mun.ca Abstract— In this paper, we present an analysis of the digital of battery limitations and portability, while for virtual private hardware implementation of two stream ciphers proposed for the network (VPN) applications and secure e-commerce web eSTREAM project: Salsa20 and Phelix. Both high speed and servers, demand for high-speed encryption is rapidly compact designs are examined, targeted to both field increasing. programmable (FPGA) and application specific integrated circuit When considering implementation technologies, normally, (ASIC) technologies. the ASIC approach provides better performance in density and The studied designs are specified using the VHDL hardware throughput, but an FPGA is reconfigurable and more flexible. description language, and synthesized by using Synopsys CAD In our study, several schemes are used, catering to the features tools. The throughput of the compact ASIC design for Phelix is of the target technology. 260 Mbps targeted for 0.18µ CMOS technology and the corresponding area is equivalent to about 12,400 2-input NAND 2. PHELIX gates. The throughput of Salsa20 ranges from 38 Mbps for the 2.1 Short Description of the Phelix Algorithm compact FPGA design, implemented using 194 CLB slices to 4.8 Phelix is claimed to be a high-speed stream cipher. It is Gbps for the high speed ASIC design, implemented with an area selected for both software and hardware performance equivalent to about 470,000 2-input NAND gates. evaluation by the eSTREAM project.
    [Show full text]
  • The Probability Advantages of Two Linear Expressions in Symmetric Ciphers
    The Probability Advantages of Two Linear Expressions in Symmetric Ciphers Haina Zhang ∗ Shaohui Wang † Xiaoyun Wang ‡ Abstract In this paper, we prove the probability advantages of two linear expressions which are summarized from the ABC stream cipher sub- mitted to ECRPYT Estream Project. Two linear expressions with probability advantages reflect the linear correlations among Modular Addition equations. Corresponding to each linear expression and its advantage, a large amount of weak keys are derived under which all the ABC main keys can be retrieved successively. The first linear expres- sion is a generic bit linear correlation between two Modular Addition equations. The second is a linear correlation of bit carries derived from three Modular Addition equations and the linear equation of LFSR in ABC. It is remarked that the second is found by Wu and Preneel, and has been used to find 296 weak keys. In the cryptanalysis of ABC, Wu and Preneel only utilized its estimated probability advantage which is concluded by experimental data, and they did not give its strict proof. Modular Addition and XOR operations are widely used in designing symmetric ciphers. We believe that these types of linear expressions with probability advantages not only can be used to analyze some other symmetric ciphers, but also are important criteria in designing secure symmetric ciphers. Key Words. Cryptanalysis, probability advantage, Modular Addi- tion, ABC stream cipher. ∗Shandong University, China. Email:[email protected]. †Shandong University, China. Email:[email protected]. ‡Shandong University and Tsinghua University, China. Email:[email protected]. 1 1 Introduction For a secure cryptographic algorithm, there should not exist any mathe- matic rule with substantial probability advantage.
    [Show full text]
  • Weak Keys for AEZ, and the External Key Padding Attack
    Weak Keys for AEZ, and the External Key Padding Attack Bart Mennink1;2 1 Dept. Electrical Engineering, ESAT/COSIC, KU Leuven, and iMinds, Belgium [email protected] 2 Digital Security Group, Radboud University, Nijmegen, The Netherlands [email protected] Abstract. AEZ is one of the third round candidates in the CAESAR competition. We observe that the tweakable blockcipher used in AEZ suffers from structural design issues in case one of the three 128-bit sub- keys is zero. Calling these keys \weak," we show that a distinguishing attack on AEZ with weak key can be performed in at most five queries. Although the fraction of weak keys, around 3 out of every 2128, seems to be too small to violate the security claims of AEZ in general, they do reveal unexpected behavior of the scheme in certain use cases. We derive a potential scenario, the \external key padding," where a user of the authenticated encryption scheme pads the key externally before it is fed to the scheme. While for most authenticated encryption schemes this would affect the security only marginally, AEZ turns out to be com- pletely insecure in this scenario due to its weak keys. These observations open a discussion on the significance of the \robustness" stamp, and on what it encompasses. Keywords. AEZ, tweakable blockcipher, weak keys, attack, external key padding, robustness. 1 Introduction Authenticated encryption aims to offer both privacy and authenticity of data. The ongoing CAESAR competition [8] targets the development of a portfolio of new, solid, authenticated encryption schemes. It received 57 submissions, 30 candidates advanced to the second round, and recently, 16 of those advanced to the third round.
    [Show full text]
  • Generic Attacks on Stream Ciphers
    Generic Attacks on Stream Ciphers John Mattsson Generic Attacks on Stream Ciphers 2/22 Overview What is a stream cipher? Classification of attacks Different Attacks Exhaustive Key Search Time Memory Tradeoffs Distinguishing Attacks Guess-and-Determine attacks Correlation Attacks Algebraic Attacks Sidechannel Attacks Summary Generic Attacks on Stream Ciphers 3/22 What is a stream cipher? Input: Secret key (k bits) Public IV (v bits). Output: Sequence z1, z2, … (keystream) The state (s bits) can informally be defined as the values of the set of variables that describes the current status of the cipher. For each new state, the cipher outputs some bits and then jumps to the next state where the process is repeated. The ciphertext is a function (usually XOR) of the keysteam and the plaintext. Generic Attacks on Stream Ciphers 4/22 Classification of attacks Assumed that the attacker has knowledge of the cryptographic algorithm but not the key. The aim of the attack Key recovery Prediction Distinguishing The information available to the attacker. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-chipertext Generic Attacks on Stream Ciphers 5/22 Exhaustive Key Search Can be used against any stream cipher. Given a keystream the attacker tries all different keys until the right one is found. If the key is k bits the attacker has to try 2k keys in the worst case and 2k−1 keys on average. An attack with a higher computational complexity than exhaustive key search is not considered an attack at all. Generic Attacks on Stream Ciphers 6/22 Time Memory Tradeoffs (state) Large amounts of precomputed data is used to lower the computational complexity.
    [Show full text]
  • The Rc4 Stream Encryption Algorithm
    TTHEHE RC4RC4 SSTREAMTREAM EENCRYPTIONNCRYPTION AALGORITHMLGORITHM William Stallings Stream Cipher Structure.............................................................................................................2 The RC4 Algorithm ...................................................................................................................4 Initialization of S............................................................................................................4 Stream Generation..........................................................................................................5 Strength of RC4 .............................................................................................................6 References..................................................................................................................................6 Copyright 2005 William Stallings The paper describes what is perhaps the popular symmetric stream cipher, RC4. It is used in the two security schemes defined for IEEE 802.11 wireless LANs: Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). We begin with an overview of stream cipher structure, and then examine RC4. Stream Cipher Structure A typical stream cipher encrypts plaintext one byte at a time, although a stream cipher may be designed to operate on one bit at a time or on units larger than a byte at a time. Figure 1 is a representative diagram of stream cipher structure. In this structure a key is input to a pseudorandom bit generator that produces a stream
    [Show full text]
  • Stream Cipher Designs: a Review
    SCIENCE CHINA Information Sciences March 2020, Vol. 63 131101:1–131101:25 . REVIEW . https://doi.org/10.1007/s11432-018-9929-x Stream cipher designs: a review Lin JIAO1*, Yonglin HAO1 & Dengguo FENG1,2* 1 State Key Laboratory of Cryptology, Beijing 100878, China; 2 State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China Received 13 August 2018/Accepted 30 June 2019/Published online 10 February 2020 Abstract Stream cipher is an important branch of symmetric cryptosystems, which takes obvious advan- tages in speed and scale of hardware implementation. It is suitable for using in the cases of massive data transfer or resource constraints, and has always been a hot and central research topic in cryptography. With the rapid development of network and communication technology, cipher algorithms play more and more crucial role in information security. Simultaneously, the application environment of cipher algorithms is in- creasingly complex, which challenges the existing cipher algorithms and calls for novel suitable designs. To accommodate new strict requirements and provide systematic scientific basis for future designs, this paper reviews the development history of stream ciphers, classifies and summarizes the design principles of typical stream ciphers in groups, briefly discusses the advantages and weakness of various stream ciphers in terms of security and implementation. Finally, it tries to foresee the prospective design directions of stream ciphers. Keywords stream cipher, survey, lightweight, authenticated encryption, homomorphic encryption Citation Jiao L, Hao Y L, Feng D G. Stream cipher designs: a review. Sci China Inf Sci, 2020, 63(3): 131101, https://doi.org/10.1007/s11432-018-9929-x 1 Introduction The widely applied e-commerce, e-government, along with the fast developing cloud computing, big data, have triggered high demands in both efficiency and security of information processing.
    [Show full text]