Comprehensive Survey on the Constructional Design of Existing Stream Ciphers

Comprehensive Survey on the Constructional Design of Existing Stream Ciphers

Comprehensive Survey on the Constructional Design of Existing Stream Ciphers Khaled M. Suwais School of Computer Sciences, Universiti Sains Malaysia, Malaysia [email protected] Azman Samsudin School of Computer Sciences, Universiti Sains Malaysia, Malaysia [email protected] ABSTRACT The purpose of this study is to present a comprehensive survey and extensive analysis of existing stream ciphers. The survey is carried out to satisfy several goals. First, to provide comprehensive literature review that summarizes the constructional design of current stream ciphers. Second, to present a consistent classification of stream ciphers in order to facilitate the understanding of existing stream ciphers, and the development of new stream ciphers. Third, to provide extensive security analysis for existing stream cipher categories. Key Words: Stream Cipher, Cryptography, Encryption, NP-hard Problem. 1. Introduction As shown in Figure 1, the core of any stream Cryptography is fundamental to most computer cipher is located in its keystream generator. Therefore security applications and it is used to help in this paper we classify and analyze various stream cryptographic services in securing communication ciphers from the design perspectives of the keystream over unsecured channels. Cryptography focuses on generator. issues of securing messages so that only the relevant This study is conducted due to the importance of parties can read the messages. Transforming a stream ciphers in securing information, which is message (plaintext) to an incomprehensive form considered as the most strategic resources. (ciphertext) is accomplished by a process known as Furthermore, the study aims to fulfill several encryption. In contrast, transforming an encrypted objectives, including: to provide comprehensive message to its original form is accomplished by a literature review that summarize the constructional process known as decryption. designs of existing stream ciphers, to shape a clear Those transformations (encryption and vision of stream ciphers designs through a consistent decryption) are achieved by two classes of classification that can assist the development process cryptographic algorithms: symmetric key and of new stream cipher, and finally to provide an asymmetric key algorithms. In this paper we are extensive security analysis for several existing stream focusing on one type of the symmetric key algorithms ciphers categories. known as stream ciphers. The rest of the paper is organized as follows: In stream ciphers, based on an input key, a Section 2 presents a comprehensive classification and sequence of random bits is generated and used as categorization of existing stream ciphers, supported keystream that will never be used again during the by security analysis for each category. In Section 3, run of the cipher. The general structure of stream we discuss the general properties of each category ciphers is portrayed in Figure 1. from the design and security perspectives. Lastly, the conclusion of our survey paper is presented in Section 4. 2. Stream Ciphers Classification Stream ciphers are classified into three fundamental categories: hardware-based, software- based and hybrid design stream ciphers. In this Figure 1: The general design of stream ciphers section we explore and analyze the important features random keystream bits to reconstruct a system of and properties of each category of the stream ciphers. linear equations. This attack is feasible with complexity of ℓ for any parameter ℓ. On the other hand, if the feedback coefficients are unknown, 2.1 Hardware Based Stream Ciphers the inner seed can be reconstructed with 2ℓ The use of hardware implementations was consecutive keystream bits. This attack with significant in providing the security for various complexity of ℓ, is also feasible since it is based cryptographic applications. The majority of stream on solving a system of 2ℓ linear equations. ciphers designs rest on the use of different types of In order to use in generating keystreams shift-registers in their implementation. The majority with minimum level of security, non-linear functions of these ciphers are either rely on Linear Feed-back have to be merged with to make the bit Shift Register, Non-Linear Feed-back Shift production process after each clocking work in non- Register , Feedback Carry Shift Register linear fashion. To achieve this purpose, different (), or on a combination of two types of shift techniques had been introduced such as adding non- registers. The second level of our classification shows linear filters, non-linear updates, irregular clocking to that the hardware-based stream ciphers are divided remove the linearity found in . into three categories: , / and Clock The non-linearity function can be provided by the Control stream ciphers, as shown in Figure 2. following generators: • Shrinking and Self-Shrinking Generator: Hardware- Coppersmith, Krawczy and Mansour proposed in [2] based a new generator which consists of two which was named, shrinking generator. The shrinking generator is designed as pseudorandom keystream LFSR NLFSR/FCSR Clock Control generator and it is preferred due to the simplicity of its design. Each one of the produces a bit Shrinking & stream represented by a and b produced by -A Stop & Go i i Self-shrinking and -B respectively, to form the keystream . However, shrinking generators are subjected to Summation Cascade known-plaintext distinguishing attack which is first introduced in [3]. The attack had detected some non- randomness in the distribution of the keystream bits. Boolean ABSG Self-Shrinking generator [4] is another variant of Functions Mechanism the shrinking generator concept. The generator rests on single instead of using two different F igure 2: The classification of hardware-based as in the shrinking generator. The procedure of stream ciphers clocking self-shrinking generators is done by firstly clocking two bits from the , resulting in a pair of bits ,. If , equals to the value (1,0) 2.1.1 LFSR Based Stream Ciphers or (1,1), then it is taken as a pseudorandom bit 0 or 1 An is a shift register which is able to hold respectively. If the pair equals the value (0,0) or (0,1), one symbol at a time and its input is a linear the pair will be discarded [4]. combination of the previous state. rely on Let ,,,… be the output bits of a system clocks for their operations, in which system non-trivial initialized self-shrinking of length clock is responsible for the timing of all events. With N. Therefore, is a sequence with period 2 1. every clocking of the , the registers read a new With respect to the period of a, cryptanalysis attack in symbol from the input, and the symbols move [4] showed that if the period of a is at least 2/ and forward from register ℓ1 to register 0. the linear complexity of the construction is 2, an One important feature of is its ability to attacker can attack the cconstruction in 2. steps. produce an extremely long pseudorandom sequence Summation Generator: Rainer Rueppel • equal to 2 , where n is the number of register introduced a new generator based on the use of elements in the . was believed to be able called summattion generator [5]. The idea to deliver stream cipher with uniformed distribution behind this generator relies on the non-linearity of the values generated by the keystream generator. provided by the carry-in integer addition. Rueppel The immediate output of is not acceptable to be uses the output of several through an adder used as keystream since the output is produced in a with carry, which in turn can provide a combination linear fashion [1]. If an attacker knows the feedback function with good non-linearity and high-order coefficients ,, …,ℓ, the attacker can use ℓ correlation properties [6]. In term of the security Rueppl’s generator is another two types of shift registers used in stream subjected to correlation attacks since the probability ciphers. The main purpose of these registers is to of input-output correlation is of 0.5 [7]. One example eliminate and destroy the linearity found in . of the summation generator is the E0 stream cipher The design of applies a non-linear function in which is used in the Bluetooth protocol [8]. However, the shift register to ensure the non-linearity in the various cryptanalysis and statistical attacks on E0 had output values from the corresponding shift register. been presented in [9], making E0 stream cipher not are used in several stream cipher designs secure for cryptographic applications. such as the Grain stream cipher. Grain was developed Another example where summation generation is in 2004 and submitted to eSTREAM project for used, is a parallelized stream cipher presented in [10]. evaluation in 2005 [20]. However, Grain was attacked Few years later, an algebraic attack against the in 2006 by two cryptanalysts as found in [21] and generator was presented in [11], making the [22]. parallelized stream cipher subjected to security are similar to with the difference vulnerability. that the elementary addition in is with • Boolean Functions: In mathematics, a Boolean propagation of carries instead of addition modulo 2 as function is defined as a mapping of one or more in . An example of -based stream cipher is binary input variables to one binary output the F- stream cipher, which was developed variable . Formally, we write the mapping function recently and submitted for eSTREAM project as follows: evaluation [23]. However, F- was attacked in [24] due to the weaknesses found in the initialization : mechanisms as well as lacking entropy on the internal state. An interesting property of Boolean functions which attract several cryptographic applications is the balancing of the digits zero and one in the generated 2.1.3 Clock Control Based Stream Cipher sequence. Generally, a Boolean function is said to be One way of introducing the non-linearity in the balanced if the probability of that function is 0.5 for generated keystream is by having a shift register all input variables chosen uniformly over a binary clocked irregularly.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    10 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us