A NEW PRIMITIVE FOR STREAM CIPHERS APPLICABLE TO PERVASIVE ENVIRONMENTS

被引:0
|
作者
Choi, Jun [1 ]
Moon, Dukjae [1 ]
Lee, Sangjin [2 ]
机构
[1] Sansung Publ Coporat, Informat Secur Dept, Seoul, South Korea
[2] Korea Univ, Ctr Informat Secur Technol, Dept Math, Seoul, South Korea
来源
INTELLIGENT AUTOMATION AND SOFT COMPUTING | 2010年 / 16卷 / 03期
关键词
Cryptographic Primitive; Stream Cipher; Pervasive Environments; PC-AddRotR; FEEDBACK;
D O I
10.1080/10798587.2010.10643093
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Computing devices in pervasive environments have limitations on the following attributes: calculation capacity, power consumption, and chip size. The huge amount of operation required for applications of cryptographic primitives restricts the implementation of these primitives in pervasive environments. In order to overcome such limitations, we propose a new primitive for stream ciphers called PC-AddRotR (Pervasive Computing - Adder Right Rotation). PC-AddRotR is easily implemented by light-weight hardware and fast word-based software. PC-AddRotR efficiently generates sequences of long period and multi-bit sequences. In addition, using a word-based adder with a nonlinear property, it has more resistance against algebraic attacks, which are known to be the strong analysis methods for stream ciphers.
引用
收藏
页码:461 / 470
页数:10
相关论文
共 50 条
  • [31] Special Issue on Stream Ciphers
    Maitra, Subhamoy
    Sarkar, Palash
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2012, 4 (3-4): : 145 - 146
  • [32] Correlation attacks on stream ciphers
    Penzhorn, WT
    AFRICON '96 - 1996 IEEE AFRICON : 4TH AFRICON CONFERENCE IN AFRICA, VOLS I & II: ELECTRICAL ENERGY TECHNOLOGY; COMMUNICATION SYSTEMS; HUMAN RESOURCES, 1996, : 1093 - 1098
  • [33] The Research of Modern Stream Ciphers
    Gorbenko, Ivan
    Kuznetsov, Alexandr
    Lutsenko, Maria
    Ivanenko, Dmytro
    2017 4TH INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS-SCIENCE AND TECHNOLOGY (PIC S&T), 2017, : 207 - 210
  • [34] Stream ciphers for GSM networks
    Lo, CC
    Chen, YJ
    ICC 2000: IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CONFERENCE RECORD, VOLS 1-3: GLOBAL CONVERGENCE THROUGH COMMUNICATIONS, 2000, : 80 - 84
  • [35] Feistel Ciphers Based on a Single Primitive∗
    Tsuji, Kento
    Iwata, Tetsu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2024, E107A (08) : 1229 - 1240
  • [36] Stream Ciphers and the eSTREAM Project
    Rijmen, Vincent
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 2 (01): : 3 - 11
  • [37] Observability of permutations, and stream ciphers
    Byerly, RE
    Drager, LD
    Lee, JM
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (12) : 3326 - 3330
  • [38] Stream ciphers for GSM networks
    Lo, CC
    Chen, YJ
    COMPUTER COMMUNICATIONS, 2001, 24 (11) : 1090 - 1096
  • [39] Boolean Functions for Stream Ciphers
    Potii, Oleksandr
    Poluyanenko, Nikolay
    Petrenko, Anna
    Pidkhomnyi, Oleg
    Florov, Serhii
    Kuznetsova, Tetiana
    2019 IEEE 2ND UKRAINE CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (UKRCON-2019), 2019, : 942 - 946
  • [40] Stream Ciphers Analysis Methods
    Bucerzan, D.
    Craciun, M.
    Chis, V.
    Ratiu, C.
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2010, 5 (04) : 483 - 489