PRNG based Symmetric Stream Cipher

نویسنده

  • J K M Sadique Uz Zaman
چکیده

--------------------------------------------------------------------ABSTRACT-----------------------------------------------------------An algorithm of symmetric stream cipher is proposed embedding a PRNG within it. Stream ciphers require a random key stream. A simple exclusive OR operation is needed between the randomly generated key stream and the text character to obtain the cipher text. Randomness of the cipher text depends on the randomness of the key stream. A comparative study on randomness of three key streams namely RC4, PM and BBS is observed in this paper. In the study, 13424 key-bits are generated in each key sequence. For each algorithm 300 such key sequences are generated using different keys. The randomness characteristics of 300 key sequences of each algorithm are tested using four basic statistical tests. Results are compared and it is observed that using a PRNG in the proposed algorithm makes it statistically secured.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Security of IV Dependent Stream Ciphers

Almost all the existing stream ciphers are using two inputs: a secret key and an initial value (IV). However recent attacks indicate that designing a secure IV-dependent stream cipher and especially the key and IV setup component of such a cipher remains a difficult task. In this paper we first formally establish the security of a well known generic construction for deriving an IV-dependent str...

متن کامل

Secure PRNGs from Specialized Polynomial Maps over Any Fq

Berbain, Gilbert, and Patarin presented QUAD, a pseudo random number generator (PRNG) at Eurocrypt 2006. QUAD (as PRNG and stream cipher) may be proved secure based on an interesting hardness assumption about the one-wayness of multivariate quadratic polynomial systems over F2. The original BGP proof only worked for F2 and left a gap to general Fq. We show that the result can be generalized to ...

متن کامل

An Efficient Prng for Stream Ciphers Based on Hybrid Cellular Automata with Nonlinear Feedback

This work proposes a high efficiency PRNG suitable for use in stream ciphers. It is based on hybrid cellular automata with nonlinear feedback to improve its resistance to attacks. It is shown that it can be designed with an arbitrary number N of cells as long as N>Nth with no need for designing a new polynomial like in traditional feedback shift registers (it is easily scalable). The space of t...

متن کامل

Implementation of a Stream Cipher Based on Bernoulli's Map

A stream cipher was implemented on a FPGA. The keystream, for some authors the most important element, was developed using an algorithm based on Bernoulli’s chaotic map. When dynamic systems are digitally implemented, a normal degradation appears and disturbs their behavior; for such reason, a mechanism was needed. The proposed mechanism gives a solution for degradation issue and its implementa...

متن کامل

Security Analysis of Generalized Confidential Modulation

We propose a new evaluation method for ‘generalized confidential modulation (GCM)’ for quantum communication. Confidential modulation realizes a secret communication by using secret information for modulation and noise in a channel. Y-00 is one of the famous methods of GCM for quantum communication. The existing evaluation methods for GCM are based on stream ciphers. They can estimate its analy...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013