New Stream Cipher Designs

The ESTREAM Finalists

Author: Matthew Robshaw,Olivier Billet

Publisher: Springer Science & Business Media

ISBN: 354068350X

Category: Computers

Page: 293

View: 3761

Thequestion“Streamciphers:deadoralive?”wasposedbyAdiShamir.Intended to provokedebate,the questioncouldnot havebeen better, ormorestarkly,put. However,itwasnotShamir'sintentiontosuggestthatstreamciphersthemselves were obsolete; rather he was questioning whether stream ciphers of a dedicated designwererelevantnowthattheAESispervasivelydeployedandcanbeusedas a perfectly acceptablestreamcipher. To explore this question the eSTREAM Project was launched in 2004, part of the EU-sponsored ECRYPT Framework VI Network of Excellence. The goal of the project was to encourage academia and industry to consider the “dead stream cipher” and to explore what could be achieved with a dedicated design. Now, after several years of hard work, the project has come to a close and the 16 ciphers in the ?nal phase of eSTREAM are the subject of this book. The designers of all the ?nalist ciphers are to be congratulated. Regardless of whether a particular algorithm appears in the ?nal portfolio, in reaching the third phase of eSTREAM all the algorithms constitute a signi?cant milestone in the development of stream ciphers. However, in addition to thanking all designers, implementers, and crypt- alysts who participated in eSTREAM, this is a ?tting place to o?er thanks to some speci?c individuals.

Stream Ciphers

Author: Andreas Klein

Publisher: Springer Science & Business Media

ISBN: 1447150791

Category: Computers

Page: 399

View: 7973

In cryptography, ciphers is the technical term for encryption and decryption algorithms. They are an important sub-family that features high speed and easy implementation and are an essential part of wireless internet and mobile phones. Unlike block ciphers, stream ciphers work on single bits or single words and need to maintain an internal state to change the cipher at each step. Typically stream ciphers can reach higher speeds than block ciphers but they can be more vulnerable to attack. Here, mathematics comes into play. Number theory, algebra and statistics are the key to a better understanding of stream ciphers and essential for an informed decision on their safety. Since the theory is less developed, stream ciphers are often skipped in books on cryptography. This book fills this gap. It covers the mathematics of stream ciphers and its history, and also discusses many modern examples and their robustness against attacks. Part I covers linear feedback shift registers, non-linear combinations of LFSRs, algebraic attacks and irregular clocked shift registers. Part II studies some special ciphers including the security of mobile phones, RC4 and related ciphers, the eStream project and the blum-blum-shub generator and related ciphers. Stream Ciphers requires basic knowledge of algebra and linear algebra, combinatorics and probability theory and programming. Appendices in Part III help the reader with the more complicated subjects and provides the mathematical background needed. It covers, for example, complexity, number theory, finite fields, statistics, combinatorics. Stream Ciphers concludes with exercises and solutions and is directed towards advanced undergraduate and graduate students in mathematics and computer science.

Stream Ciphers and Number Theory

Author: Thomas W. Cusick,Cunsheng Ding,Ari R. Renvall

Publisher: Gulf Professional Publishing

ISBN: 9780444516312

Category: Mathematics

Page: 474

View: 2358

This is the unique book on cross-fertilisations between stream ciphers and number theory. It systematically and comprehensively covers known connections between the two areas that are available only in research papers. Some parts of this book consist of new research results that are not available elsewhere. In addition to exercises, over thirty research problems are presented in this book. In this revised edition almost every chapter was updated, and some chapters were completely rewritten. It is useful as a textbook for a graduate course on the subject, as well as a reference book for researchers in related fields. · Unique book on interactions of stream ciphers and number theory. · Research monograph with many results not available elsewhere. · A revised edition with the most recent advances in this subject. · Over thirty research problems for stimulating interactions between the two areas. · Written by leading researchers in stream ciphers and number theory.

Stream Ciphers and Number Theory

Author: T.W. Cusick,C. Ding,Ari R. Renvall

Publisher: Elsevier

ISBN: 0080541844

Category: Mathematics

Page: 430

View: 8669

This book is almost entirely concerned with stream ciphers, concentrating on a particular mathematical model for such ciphers which are called additive natural stream ciphers. These ciphers use a natural sequence generator to produce a periodic keystream. Full definitions of these concepts are given in Chapter 2. This book focuses on keystream sequences which can be analysed using number theory. It turns out that a great deal of information can be deducted about the cryptographic properties of many classes of sequences by applying the terminology and theorems of number theory. These connections can be explicitly made by describing three kinds of bridges between stream ciphering problems and number theory problems. A detailed summary of these ideas is given in the introductory Chapter 1. Many results in the book are new, and over seventy percent of these results described in this book are based on recent research results.

The Stability Theory of Stream Ciphers

Author: Cunsheng Ding,Guozhen Xiao,Weijuan Shan

Publisher: Springer Science & Business Media

ISBN: 9783540549734

Category: Computers

Page: 187

View: 8280

Secure message transmission is of extreme importance in today's information-based society. Stream encryption is a practically important means to this end. This monograph is devoted to a new aspect of stream ciphers, namely the stability theory of stream ciphers, with the purpose of developing bounds on complexity which can form part of the basis for a general theory of data security and of stabilizing stream-cipher systems. The approach adopted in this monograph is new. The topic is treated by introducing measure indexes on the security of stream ciphers, developing lower bounds on these indexes, and establishing connections among them. The treatment involves the stability of boolean functions, the stability of linear complexity of key streams, the period stability of key streams, and the stability of source codes. Misleading ideas about stream ciphers are exposed and new viewpoints presented. The numerous measure indexes and bounds on them that are introduced here, the approach based on spectrum techniques, andthe ten open problems presented will all be useful to the reader concerned with analyzing and designing stream ciphers for securing data.

RC4 Stream Cipher and Its Variants

Author: Goutam Paul,Subhamoy Maitra

Publisher: CRC Press

ISBN: 1439831351

Category: Computers

Page: 311

View: 8363

RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With extensive expertise in stream cipher cryptanalysis and RC4 research, the authors focus on the analysis and design issues of RC4. They also explore variants of RC4 and the eSTREAM finalist HC-128. After an introduction to the vast field of cryptology, the book reviews hardware and software stream ciphers and describes RC4. It presents a theoretical analysis of RC4 KSA, discussing biases of the permutation bytes toward secret key bytes and absolute values. The text explains how to reconstruct the secret key from known state information and analyzes the RC4 PRGA in detail, including a sketch of state recovery attacks. The book then describes three popular attacks on RC4: distinguishing attacks, Wired Equivalent Privacy (WEP) protocol attacks, and fault attacks. The authors also compare the advantages and disadvantages of several variants of RC4 and examine stream cipher HC-128, which is the next level of evolution after RC4 in the software stream cipher paradigm. The final chapter emphasizes the safe use of RC4. With open research problems in each chapter, this book offers a complete account of the most current research on RC4.

Kryptografie verständlich

Ein Lehrbuch für Studierende und Anwender

Author: Christof Paar,Jan Pelzl

Publisher: Springer-Verlag

ISBN: 3662492970

Category: Computers

Page: 416

View: 7733

Das Buch gibt eine umfassende Einführung in moderne angewandte Kryptografie. Es behandelt nahezu alle kryptografischen Verfahren mit praktischer Relevanz. Es werden symmetrische Verfahren (DES, AES, PRESENT, Stromchiffren), asymmetrische Verfahren (RSA, Diffie-Hellmann, elliptische Kurven) sowie digitale Signaturen, Hash-Funktionen, Message Authentication Codes sowie Schlüsselaustauschprotokolle vorgestellt. Für alle Krypto-Verfahren werden aktuelle Sicherheitseinschätzungen und Implementierungseigenschaften beschrieben.

Analysis and Design of Stream Ciphers

Author: Rainer A. Rueppel

Publisher: Springer Science & Business Media

ISBN: 3642828655

Category: Technology & Engineering

Page: 244

View: 6950

It is now a decade since the appearance of W. Diffie and M. E. Hellmann's startling paper, "New Directions in Cryptography". This paper not only established the new field of public-key cryptography but also awakened scientific interest in secret-key cryptography, a field that had been the almost exclusive domain of secret agencies and mathematical hobbyist. A number of ex cellent books on the science of cryptography have appeared since 1976. In the main, these books thoroughly treat both public-key systems and block ciphers (i. e. secret-key ciphers with no memo ry in the enciphering transformation) but give short shrift to stream ciphers (i. e. , secret-key ciphers wi th memory in the enciphering transformation). Yet, stream ciphers, such as those . implemented by rotor machines, have played a dominant role in past cryptographic practice, and, as far as I can determine, re main still the workhorses of commercial, military and diplomatic secrecy systems. My own research interest in stream ciphers found a natural re sonance in one of my doctoral students at the Swiss Federal Institute of Technology in Zurich, Rainer A. Rueppe1. As Rainer was completing his dissertation in late 1984, the question arose as to where he should publish the many new results on stream ciphers that had sprung from his research.

Handbook of Applied Cryptography

Author: Alfred J. Menezes,Paul C. van Oorschot,Scott A. Vanstone

Publisher: CRC Press

ISBN: 1439821917

Category: Mathematics

Page: 810

View: 6380

Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography. The Handbook of Applied Cryptography provides a treatment that is multifunctional: It serves as an introduction to the more practical aspects of both conventional and public-key cryptography It is a valuable source of the latest techniques and algorithms for the serious practitioner It provides an integrated treatment of the field, while still presenting each major topic as a self-contained unit It provides a mathematical treatment to accompany practical discussions It contains enough abstraction to be a valuable reference for theoreticians while containing enough detail to actually allow implementation of the algorithms discussed Now in its third printing, this is the definitive cryptography reference that the novice as well as experienced developers, designers, researchers, engineers, computer scientists, and mathematicians alike will use.

Fast Software Encryption

Second International Workshop, Leuven, Belgium, December 14-16, 1994. Proceedings

Author: Bart Preneel

Publisher: Springer Science & Business Media

ISBN: 9783540605904

Category: Computers

Page: 366

View: 7603

This book contains a set of revised refereed papers selected from the presentations at the Second International Workshop on Fast Software Encryption held in Leuven, Belgium, in December 1994. The 28 papers presented significantly advance the state of the art of software algorithms for two cryptographic primitives requiring very high speeds, namely encryption algorithms and hash functions: this volume contains six proposals for new ciphers as well as new results on the security of the new proposals. In addition, there is an introductory overview by the volume editor. The papers are organized in several sections on stream ciphers and block ciphers; other papers deal with new algorithms and protocols or other recent results.

IPSec

The New Security Standard for the Internet, Intranets, and Virtual Private Networks

Author: Naganand Doraswamy,Dan Harkins

Publisher: Prentice Hall Professional

ISBN: 9780130461896

Category: Computers

Page: 262

View: 5204

IPSec, Second Edition is the most authoritative, comprehensive, accessible, and up-to-date guide to IPSec technology. Two leading authorities cover all facets of IPSec architecture, implementation, and deployment; review important technical advances since IPSec was first standardized; and present new case studies demonstrating end-to-end IPSec security. New coverage also includes in-depth guidance on policies, updates on IPSec enhancements for large-scale enterprise environments, and much more.

Topics in Cryptology – CT-RSA 2007

The Cryptographers' Track at the RSA Conference 2007, San Fancisco, CA, USA, February 5-9, 2007, Proceedings

Author: Masayuki Abe

Publisher: Springer Science & Business Media

ISBN: 3540693270

Category: Business & Economics

Page: 401

View: 758

The RSA Conference, with over 15,000 attendees and 300 exhibitors, is the largest computer security event of the year. The Cryptographers’ Track (CT- RSA) is a research conference within the RSA Conference. Starting in 2001, CT-RSA continues to its seventh year and is now regarded as one of the major regularly staged event for presenting the results of cryptographic research to a wide variety of audiences. The proceedings of CT-RSA 2007 contain 25 papers selected from 73 s- missions which cover all the topics of cryptography. All the submissions were reviewed by at least three reviewers, which was possible by the hard work of 23 Program Committee members and many external reviewers listed in the foll- ing pages. The papers were selected as a result of conscientious discussion. The program includes two invited talks, by Michel Rabin and Andrew Odlyzko. I would like to express my gratitude to the Program Committee members, whowereenthusiasticfromtheverybeginningofthis completedproject.Thanks also to the external reviewers including those who completed urgent reviews during the discussion phase. Special thanks to Shai Halevi for providing and maintaining the Web review system. Finally, I would like to thank Burt Kaliski of RSA Laboratories and the Steering Committee for their suggestions and c- tinuous assistance.

Computer and Information Sciences - ISCIS 2005

20th International Symposium, Istanbul, Turkey, October 26 -- 28, 2005, Proceedings

Author: Pinar Yolum,Tunga Güngör,Fikret Gürgen,Can Özturan

Publisher: Springer Science & Business Media

ISBN: 9783540294146

Category: Computers

Page: 973

View: 645

This book constitutes the refereed proceedings of the 20th International Symposium on Computer and Information Sciences, ISCIS 2005, held in Istanbul, Turkey in October 2005. The 92 revised full papers presented together with 4 invited talks were carefully reviewed and selected from 491 submissions. The papers are organized in topical sections on computer networks, sensor and satellite networks, security and cryptography, performance evaluation, e-commerce and Web services, multiagent systems, machine learning, information retrieval and natural language processing, image and speech processing, algorithms and database systems, as well as theory of computing.

Advances in Cryptology - EUROCRYPT 2006

25th International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings

Author: Serge Vaudenay

Publisher: Springer Science & Business Media

ISBN: 3540345469

Category: Business & Economics

Page: 611

View: 7470

The 2006 edition of the Eurocrypt conference was held in St. Petersburg,Russia from May 28 to June 1, 2006. It was the 25th Eurocrypt conference. Eurocrypt is sponsored by the International Association for Cryptologic Research (IACR). Eurocrypt2006waschairedbyAnatolyLebedev,andIhadtheprivilegetochair the Program Committee. Eurocrypt collected 198 submissions on November 21, 2005. The Program Committee carried out a thorough review process. In total, 863 review reports were written by renowned experts, Program Committee members as well as external referees. Online discussions led to 1,114 additional discussion messages and about 1,000 emails. The review process was run using e-mail and the iChair software by Thomas Baign` eres and Matthieu Finiasz. Every submitted paper received at least three review reports. The Program Committee had a meeting in Lausanne on February 4, 2006. We selected 33 papers, noti?ed acceptance or rejection to the authors, and had a cheese fondue. Authors were then invited to revise their submission. The present proceedings include all the revised papers. Due to time constraints the revised versions could not be reviewed again. We delivered a “Eurocrypt Best Paper Award.” The purpose of the award is to formally acknowledge authors of outstanding papers and to recognize - cellence in the cryptographic research ?elds. Committee members were invited to nominate papers for this award. A poll then yielded a clear majority. This year, we were pleased to deliver the Eurocrypt Best Paper Award to Phong Q.

Cryptography and Coding

8th IMA International Conference Cirencester, UK, December 17-19, 2001 Proceedings

Author: Bahram Honary

Publisher: Springer Science & Business Media

ISBN: 3540430261

Category: Business & Economics

Page: 416

View: 1905

This book constitutes the refereed proceedings of the 8th International IMA Conference on Cryptography and Coding held in Cirencester, UK in December 2001. The 33 revised full papers presented together with four invited papers were carefully reviewed and selected from numerous submissions. Among the topics covered are mathematical bounds, statistical decoding schemes for error-correcting codes, multifunctional and multiple access communication systems, low density parity check codes, iterative coding, authentication, key recovery attacks, stream cipher design, analysis of ECIES algorithms, and lattice bases attacks on IP based protocols.

Secure Communicating Systems

Design, Analysis, and Implementation

Author: Michael Huth,Michael R. A. Huth

Publisher: Cambridge University Press

ISBN: 9780521807319

Category: Computers

Page: 283

View: 3852

More and more working computer professionals are confronted with the use, maintenance, or customization of cryptographic components and program certification mechanisms for local or mobile code. This text for advanced undergraduate and beginning graduate students tells what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include a detailed description of the new advanced encryption standard Rijndael; a complete description of an optimal public-key encryption using RSA which turns textbook RSA into a practical implementation; a current, and formal discussion of standard security models for information flow in computer programs or human organizations; and a discussion of moral, legal, and political issues. Another novel feature of the book is the presentation of a formal model-checking tool for specifying and debugging security protocols. The book also includes numerous implementation exercises and programming projects. A supporting web site contains Java source code for the programs featured in the text plus links to other sites, including online papers and tutorials offering deeper treatments of the topics presented.

Advanced Linear Cryptanalysis of Block and Stream Ciphers

Author: Pascal Junod,Anne Canteaut,IOS Press

Publisher: IOS Press

ISBN: 1607508443

Category: Computers

Page: 144

View: 5104

The origins of linear cryptanalysis can be traced back to a number of seminal works of the early 1990s. Since its invention, several theoretical and practical aspects of the technique have been studied, understood and generalized, resulting in more elaborated attacks against certain ciphers, but also in some negative results regarding the potential of various attempts at generalization. This book gives an overview of the current state of the discipline and it takes a look at potential future developments, and is divided into five parts. The first part deals with basic assumptions in linear cryptanalysis and their consequences for the design of modern block ciphers; part two explores a theory of multi-dimensional linear attacks on block ciphers; and, the third part covers how linear attacks can be applied to stream ciphers and gives an overview of the development of linear attacks as well as a theoretical explanation of their current use.Part four details interesting and useful links between linear cryptanalysis and coding theory and the fifth and final part discusses how correlation analysis can be conducted at the level of elements of GF (2n) without the need to deal with field representation issues. This book will be of interest to anybody who wishes to explore this fascinating yet complex part of symmetrical cryptanalysis.

Selected Areas in Cryptography

13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006, Revised Selected Papers

Author: Eli Biham

Publisher: Springer Science & Business Media

ISBN: 3540744614

Category: Business & Economics

Page: 395

View: 5118

This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Selected Areas in Cryptography, SAC 2006, held in Montreal, Canada in August 2006. The 25 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 86 submissions. The papers are organized in topical sections on block cipher cryptanalysis, stream cipher cryptanalysis, block and stream ciphers, side-channel attacks, efficient implementations, message authentication codes, and hash functions.

Writing Secure Code

Author: David LeBlanc,Michael Howard

Publisher: Pearson Education

ISBN: 0735637407

Category: Computers

Page: 800

View: 8392

Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire development process—from designing secure applications to writing robust code that can withstand repeated attacks to testing applications for security flaws. Easily digested chapters reveal proven principles, strategies, and coding techniques. The authors—two battle-scarred veterans who have solved some of the industry’s toughest security problems—provide sample code in several languages. This edition includes updated information about threat modeling, designing a security process, international issues, file-system issues, adding privacy to applications, and performing security code reviews. It also includes enhanced coverage of buffer overruns, Microsoft .NET security, and Microsoft ActiveX development, plus practical checklists for developers, testers, and program managers.