SFINKS: A Synchronous Stream Cipher for Restricted Hardware Environments

نویسندگان

  • An Braeken
  • Joseph Lano
  • Nele Mentens
  • Ingrid Verbauwhede
چکیده

We present SFINKS, a low-cost synchronous stream cipher for hardware applications with an associated authentication mechanism. The stream cipher is based on a Simple Filter generator, using the INverse function in F216 to generate the Key Stream. The design is based on simple and well-studied concepts, and its security is analyzed with respect to the portfolio of known cryptanalytic attacks for filter generators.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

State convergence in the initialisation of the Sfinks stream cipher

Sfinks is a shift register based stream cipher designed for hardware implementation. The initialisation state update function is different from the state update function used for keystream generation. We demonstrate state convergence during the initialisation process, even though the individual components used in the initialisation are one-to-one. However, the combination of these components is...

متن کامل

Cryptanalysis of Sfinks

Sfinks is an LFSR-based stream cipher submitted to ECRYPT call for stream ciphers by Braeken, Lano, Preneel et al. The designers of Sfinks do not to include any protection against algebraic attacks. They rely on the so called “Algebraic Immunity”, that relates to the complexity of a simple algebraic attack, and ignores other algebraic attacks. As a result, Sfinks is insecure.

متن کامل

Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles

In this paper, we propose a new stream cipher construction based on block cipher design principles. The main idea is to replace the building blocks used in block ciphers by equivalent stream cipher components. In order to illustrate this approach, we construct a very simple synchronous stream cipher which provides a lot of flexibility for hardware implementations, and seems to have a number of ...

متن کامل

On Algebraic Immunity of Trace Inverse Functions over Finite Fields with Characteristic Two

The trace inverse function Tr(λx−1) over the finite field F2n is a class of very important Boolean functions and has be used in many stream ciphers, for example, SFINKS, RAKAPOSHI, the simple counter stream cipher presented by W. Si and C.S. Ding, etc. In order to evaluate the security of those algorithms in assistance to (fast) algebraic attacks, it is essential to algebraic properties of Tr(λ...

متن کامل

Grain: a stream cipher for constrained environments

A new stream cipher, Grain, is proposed. The design targets hardware environments where gate count, power consumption and memory is very limited. It is based on two shift registers and a nonlinear filter function. The cipher has the additional feature that the speed can be increased at the expense of extra hardware. The key size is 80 bits and no attack faster than exhaustive key search has bee...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005