Abstract
In this paper, we introduce the rakaposhi stream cipher. The algorithm is based on Dynamic Linear Feedback Shift Registers, with a simple and potentially scalable design, and is particularly suitable for hardware applications with restricted resources. The rakaposhi stream cipher offers 128-bit security, and aims to complement the current eSTREAM portfolio of hardware-oriented stream ciphers.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Arnault, F., Berger, T., Lauradoux, C.: F-FCSR Stream Ciphers. In: Robshaw, M.J.B., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol. 4986, pp. 170–178. Springer, Heidelberg (2008)
Babbage, S.: Improved ”exhaustive search” attacks on stream ciphers. In: IEE European Convention on Security and Detection, vol. 408, pp. 161–165 (1995)
Babbage, S., De Canniere, C., Canteaut, A., Cid, C., Gilbert, H., Johansson, T., Parker, M., Preneel, B., Rijmen, V., Robshaw, M.: The eSTREAM Portfolio (rev.1), September 08 (2008), http://www.ecrypt.eu.org/stream/portfolio_revision1.pdf
Babbage, S., De Canniere, C., Canteaut, A., Cid, C., Gilbert, H., Johansson, T., Parker, M., Preneel, B., Rijmen, V., Robshaw, M.: The eSTREAM Portfolio, April 15 (2008), http://www.ecrypt.eu.org/stream/portfolio.pdf
Babbage, S., Dodd, M.: The MICKEY Stream Ciphers. In: Robshaw, M.J.B., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol. 4986, pp. 191–209. Springer, Heidelberg (2008)
Beth, T., Piper, F.C.: The stop-and-go-generator. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 88–92. Springer, Heidelberg (1985)
Biryukov, A., Shamir, A.: Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 1–13. Springer, Heidelberg (2000)
Cid, C., Robshaw, M.: The eSTREAM Portfolio 2009 Annual Update, July 31 (2009), http://www.ecrypt.eu.org/stream/eStream_reportJul09.pdf
Courtois, N., Meier, W.: Algebraic Attacks on Stream Ciphers with Linear Feedback. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 345–359. Springer, Heidelberg (2003)
Dinur, I., Shamir, A.: Cube Attacks on Tweakable Black Box Polynomials. In: Joux, A. (ed.) FroCoS 2009. LNCS, vol. 5479, pp. 278–299. Springer, Heidelberg (2009)
Dunkelman, O., Keller, N.: Treatment of the Initial Value in Time-Memory-Data Tradeoff Attacks on Stream Ciphers. Information Processing Letters 107, 133–137 (2008)
eSTREAM, the ECRYPT Stream Cipher Project, http://www.ecrypt.eu.org/stream/
Gaj, K., Southern, G., Bachimanchi, R.: Comparison of hardware performance of selected Phase II eSTREAM candidates. In: Proceedings of SASC 2007, Bochum (2007)
Golic, J.D.: On Security of Nonlinear Filter Generators. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 173–188. Springer, Heidelberg (1996)
Hell, M., Johansson, T.: Breaking the F-FCSR-H Stream Cipher in Real Time. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 557–569. Springer, Heidelberg (2008)
Hell, M., Johansson, T., Brynielsson, L.: An overview of distinguishing attacks on stream ciphers. Cryptography and Communications 1(1), 71–94 (2009)
Hell, M., Johansson, T., Maximov, A., Meier, W.: A stream cipher proposal: Grain-128. In: Proceedings of 2006 IEEE International Symposium on Information Theory, pp. 1614–1618. IEEE, Los Alamitos (2006)
Hellman, M.E.: A Cryptanalytic Time-Memory Tradeoff. IEEE Transactions on Information Theory 26(4), 401–406 (1980)
Hong, J., Sarkar, P.: New Applications of Time Memory Data Tradeoffs. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 353–372. Springer, Heidelberg (2005)
Hong, J., Sarkar, P.: Rediscovery of Time Memory Tradeoffs. Cryptology ePrint Archive, Report 2005/090 (2005), http://eprint.iacr.org/
Horan, D., Guinee, R.: A Novel Keystream Generator using Pseudo Random Binary Sequences for Cryptographic Applications. In: Irish Signals and Systems Conference 2006, pp. 451–456. IEEE, Los Alamitos (2006)
Hwang, D., Chaney, M., Karanam, S., Ton, N., Gaj, K.: Comparison of FPGA-Targeted Hardware Implementations of eSTREAM Stream Cipher Candidates. In: Proceedings of SASC (2008); Lausanne
Kiyomoto, S., Tanaka, T., Sakurai, K.: FPGA-Targeted Hardware Implementations of K2. In: Proceedings of SECRYPT 2008, pp. 270–277 (2008)
Kiyomoto, S., Tanaka, T., Sakurai, K.: K2: A Stream Cipher Algorithm Using Dynamic Feedback Control. In: Proceedings of SECRYPT 2007, pp. 204–213 (2008)
Lee, Y., Jeong, K., Sung, J., Hong, S.: Related-Key Chosen IV Attacks on Grain-v1 and Grain-128. In: Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. LNCS, vol. 5107, pp. 321–335. Springer, Heidelberg (2008)
Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1994)
Medina, M., Domínguez, A.: Caracterización de Secuencias Binarias Pseudoaleatorias generadas mediante LFSR con Realimentación Dinámica (DLFSR). In: Proceedings of XVIII Simposium Nacional de la URSI, A Coruña, Spain (2003)
Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
Mita, R., Palumbo, G., Pennisi, S., Poli, M.: Pseudorandom bit generator based on dynamic linear feedback topology. Electronic Letters 28(19), 1097–1098 (2002)
National Institute of Standards and Technology. NIST Statistical Test, http://csrc.nist.gov/rng/
Robshaw, M., Billet, O.: New Stream Cipher Designs. LNCS, vol. 4986. Springer, Heidelberg (2008)
Khazaei, S., Fischer, S., Meier, W.: Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 236–245. Springer, Heidelberg (2008)
Simpson, L.R., Dawson, E., Golic, J., Millan, W.: LILI Keystream Generator. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, vol. 2012, pp. 248–261. Springer, Heidelberg (2001)
Soriano, M.: Stream ciphers based on NLFSR. In: Proceedings of SBT/IEEE International Telecommunications Symposium 1998, pp. 528–533. IEEE, Los Alamitos (1998)
Vielhaber, M.: Breaking ONE.FIVIUM by AIDA an Algebraic IV Differential Attack, Cryptology ePrint archive, report 2007/413 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cid, C., Kiyomoto, S., Kurihara, J. (2009). The rakaposhi Stream Cipher. In: Qing, S., Mitchell, C.J., Wang, G. (eds) Information and Communications Security. ICICS 2009. Lecture Notes in Computer Science, vol 5927. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11145-7_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-11145-7_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-11144-0
Online ISBN: 978-3-642-11145-7
eBook Packages: Computer ScienceComputer Science (R0)