A NEW PRIMITIVE FOR STREAM CIPHERS APPLICABLE TO PERVASIVE ENVIRONMENTS

被引:0
|
作者
Choi, Jun [1 ]
Moon, Dukjae [1 ]
Lee, Sangjin [2 ]
机构
[1] Sansung Publ Coporat, Informat Secur Dept, Seoul, South Korea
[2] Korea Univ, Ctr Informat Secur Technol, Dept Math, Seoul, South Korea
来源
INTELLIGENT AUTOMATION AND SOFT COMPUTING | 2010年 / 16卷 / 03期
关键词
Cryptographic Primitive; Stream Cipher; Pervasive Environments; PC-AddRotR; FEEDBACK;
D O I
10.1080/10798587.2010.10643093
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Computing devices in pervasive environments have limitations on the following attributes: calculation capacity, power consumption, and chip size. The huge amount of operation required for applications of cryptographic primitives restricts the implementation of these primitives in pervasive environments. In order to overcome such limitations, we propose a new primitive for stream ciphers called PC-AddRotR (Pervasive Computing - Adder Right Rotation). PC-AddRotR is easily implemented by light-weight hardware and fast word-based software. PC-AddRotR efficiently generates sequences of long period and multi-bit sequences. In addition, using a word-based adder with a nonlinear property, it has more resistance against algebraic attacks, which are known to be the strong analysis methods for stream ciphers.
引用
收藏
页码:461 / 470
页数:10
相关论文
共 50 条
  • [41] THE STABILITY THEORY OF STREAM CIPHERS
    DING, C
    XIAO, G
    SHAN, W
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 561 : R3 - +
  • [42] Cellular Automata in Stream Ciphers
    Fuster-Sabater, Amparo
    RECENT TRENDS IN CRYPTOGRAPHY, 2009, 477 : 1 - 20
  • [43] Fault analysis of stream ciphers
    Hoch, JJ
    Shamir, A
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 240 - 253
  • [44] Stream ciphers: Dead or alive?
    Shamir, A
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2004, PROCEEDINGS, 2004, 3329 : 78 - 78
  • [45] Stream ciphers based on NLFSR
    Soriano, M
    ITS '98 PROCEEDINGS - SBT/IEEE INTERNATIONAL TELECOMMUNICATIONS SYMPOSIUM, VOLS 1 AND 2, 1998, : 528 - 533
  • [46] New weaknesses in the keystream generation algorithms of the stream ciphers TPy and py
    Sekar, Gautham
    Paul, Souradyuti
    Preneel, Bart
    INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 249 - +
  • [47] A New Adaptable Construction of Modulo Addition with Scalable Security for Stream Ciphers
    Cheng, Min Hsuan
    Sedaghat, Reza
    Siddavaatam, Prathap
    NETWORK AND SYSTEM SECURITY, (NSS 2016), 2016, 9955 : 383 - 397
  • [48] A New Approach for Side Channel Analysis on Stream Ciphers and Related Constructions
    Baksi, Anubhab
    Kumar, Satyam
    Sarkar, Santanu
    IEEE TRANSACTIONS ON COMPUTERS, 2022, 71 (10) : 2527 - 2537
  • [49] New design of LFSR based stream ciphers to resist power attack
    Zhao, Yongbin
    Hu, Yupu
    Jia, Yanyan
    Zhao, Y. (zhaoyb@stdu.edu.cn), 2013, Science Press (40): : 172 - 179
  • [50] On the use of expansion series for stream ciphers
    Diem, Claus
    LMS JOURNAL OF COMPUTATION AND MATHEMATICS, 2012, 15 : 326 - 340