High Performance Architecture for LILI-II Stream Cipher
نویسندگان
چکیده
منابع مشابه
Rabbit: A New High-Performance Stream Cipher
We present a new stream cipher, Rabbit, based on iterating a set of coupled nonlinear functions. Rabbit is characterized by a high performance in software with a measured encryption/decryption speed of 3.7 clock cycles per byte on a Pentium III processor. We have performed detailed security analysis, in particular, correlation analysis and algebraic investigations. The cryptanalysis of Rabbit d...
متن کاملReconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Based on Complexity
In this letter we assert that we have reconstructed the nonlinear filter function of LILI-128 stream cipher on IBM notebook PC using MATLAB. Our reconstruction need approximately 13 12 2 ~ 2 bits and the attack consumes 5825.016 sec (using tic and toc sentences of MATLAB) or 5825.016/3600=1.6181hours. We got the expression of the nonlinear filter function of Lili-128 which has 46 items from lin...
متن کاملChaos for Stream Cipher
This paper discusses mixing of chaotic systems as a dependable method for secure communication. Distribution of the entropy function for steady state as well as plaintext input sequences are analyzed. It is shown that the mixing of chaotic sequences results in a sequence that does not have any state dependence on the information encrypted by them. The generated output states of such a cipher ap...
متن کاملA High-Speed Hardware Implementation of the LILI-II Keystream Generator
The LILI-II keystream generator is a new LFSR based synchronous stream cipher with a 128-bit key. In this paper a high-speed hardware implementation of the LILI-II generator is presented. The proposed architecture is suitable for application with high-performance and area-restricted requirements. Reprogrammable LFSRs are used for the algorithm implementation. With this technique the usage of th...
متن کاملA Stream Cipher Based on Chaotic Permutations
In this paper we introduce a word-based stream cipher consisting of a chaotic part operating as a chaotic permutation and a linear part, both of which designed on a finite field. We will show that this system can operate in both synchronized and self-synchronized modes. More specifically, we show that in the self-synchronized mode the stream cipher has a receiver operating as an unknown input o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2014
ISSN: 0975-8887
DOI: 10.5120/18810-0378