A NEW PRIMITIVE FOR STREAM CIPHERS APPLICABLE TO PERVASIVE ENVIRONMENTS

被引:0
|
作者
Choi, Jun [1 ]
Moon, Dukjae [1 ]
Lee, Sangjin [2 ]
机构
[1] Sansung Publ Coporat, Informat Secur Dept, Seoul, South Korea
[2] Korea Univ, Ctr Informat Secur Technol, Dept Math, Seoul, South Korea
来源
关键词
Cryptographic Primitive; Stream Cipher; Pervasive Environments; PC-AddRotR; FEEDBACK;
D O I
10.1080/10798587.2010.10643093
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Computing devices in pervasive environments have limitations on the following attributes: calculation capacity, power consumption, and chip size. The huge amount of operation required for applications of cryptographic primitives restricts the implementation of these primitives in pervasive environments. In order to overcome such limitations, we propose a new primitive for stream ciphers called PC-AddRotR (Pervasive Computing - Adder Right Rotation). PC-AddRotR is easily implemented by light-weight hardware and fast word-based software. PC-AddRotR efficiently generates sequences of long period and multi-bit sequences. In addition, using a word-based adder with a nonlinear property, it has more resistance against algebraic attacks, which are known to be the strong analysis methods for stream ciphers.
引用
收藏
页码:461 / 470
页数:10
相关论文
共 50 条
  • [1] The chain & sum primitive and its applications to MACs and stream ciphers
    Jakubowski, MH
    Venkatesan, R
    ADVANCES IN CRYPTOLOGY - EUROCRYPT '98, 1998, 1403 : 281 - 293
  • [2] Primitive Polynomials for Robust Scramblers and Stream Ciphers Against Reverse Engineering
    Wu, Xin-Wen
    Koh, Soo Ngee
    Chui, Chee-Cheon
    2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2010, : 2473 - 2477
  • [3] New correlation attacks on stream ciphers
    Penzhorn, WT
    Bruwer, C
    2002 IEEE AFRICON, VOLS 1 AND 2: ELECTROTECHNOLOGICAL SERVICES FOR AFRICA, 2002, : 203 - 208
  • [4] Performance analysis of current lightweight stream ciphers for constrained environments
    Deb, Subhrajyoti
    Bhuyan, Bubu
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2020, 45 (01):
  • [5] Performance analysis of current lightweight stream ciphers for constrained environments
    Subhrajyoti Deb
    Bubu Bhuyan
    Sādhanā, 2020, 45
  • [6] New Cryptanalysis of Irregularly Decimated Stream Ciphers
    Zhang, Bin
    SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5867 : 449 - 465
  • [7] STREAM CIPHERS
    PIPER, F
    LECTURE NOTES IN COMPUTER SCIENCE, 1983, 149 : 181 - 188
  • [8] A new distinguisher for clock controlled stream ciphers
    Englund, H
    Johansson, T
    FAST SOFTWARE ENCRYPTION, 2005, 3557 : 181 - 195
  • [9] A New Stream Ciphers Based on Hyperchaotic Map
    Lin Jinqiu
    Si Xicai
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 1, 2009, : 366 - 369
  • [10] STREAM CIPHERS.
    Piper, Fred
    Elektrotechnik und Maschinenbau, 1987, 104 (12): : 564 - 568