A fast and light stream cipher for smartphones
نویسندگان
چکیده
منابع مشابه
A fast and light stream cipher for smartphones
We present a stream cipher based on a chaotic dynamical system. Using a chaotic trajectory sampled under certain rules in order to avoid any attempt to reconstruct the original one, we create a binary pseudo-random keystream that can only be exactly reproduced by someone that has fully knowledge of the communication system parameters formed by a transmitter and a receiver and sharing the same i...
متن کاملTuring: A Fast Stream Cipher
This paper proposes the Turing stream cipher. Turing offers up to 256-bit key strength, and is designed for extremely efficient software implementation.It combines an LFSR generator based on that of SOBER [21] with a keyed mixing function reminiscent of a block cipher round. Aspects of the block mixer round have been derived from Rijndael [6], Twofish [23], tc24 [24] and SAFER++ [17].
متن کاملABC: A New Fast Flexible Stream Cipher
ABC is a synchronous stream cipher optimized for software applications. Its key length is 128 bits. It accommodates a 128-bit initial vector. Here a version of ABC with a 128-bit key and 32-bit internal variables is presented. A new approach to the design of stream ciphers has been used which results in a cipher based upon keyand clock-dependent state transition and filter functions. More preci...
متن کاملFish: A Fast Software Stream Cipher
Coppersmith, Krawczyk, and Mansour ([CKM93]) presented at Crypto '93 a promising stream cipher, the shrinking generator. It is based on linear shift registers with linear feedback. The output bits of one shift register decide which of the output bits of the other shift registers are used and which are discarded. The design is well suited for hardware implementation. In software shift registers ...
متن کاملDragon: A Fast Word Based Stream Cipher
This paper presents Dragon, a new stream cipher constructed using a single word based non-linear feedback shift register and a nonlinear filter function with memory. Dragon uses a variable length key and initialisation vector of 128 or 256 bits, and produces 64 bits of keystream per iteration. At the heart of Dragon are two highly optimised 8 × 32 s-boxes. Dragon uses simple operations on 32-bi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The European Physical Journal Special Topics
سال: 2014
ISSN: 1951-6355,1951-6401
DOI: 10.1140/epjst/e2014-02185-y