PRNG based Symmetric Stream Cipher
نویسنده
چکیده
--------------------------------------------------------------------ABSTRACT-----------------------------------------------------------An algorithm of symmetric stream cipher is proposed embedding a PRNG within it. Stream ciphers require a random key stream. A simple exclusive OR operation is needed between the randomly generated key stream and the text character to obtain the cipher text. Randomness of the cipher text depends on the randomness of the key stream. A comparative study on randomness of three key streams namely RC4, PM and BBS is observed in this paper. In the study, 13424 key-bits are generated in each key sequence. For each algorithm 300 such key sequences are generated using different keys. The randomness characteristics of 300 key sequences of each algorithm are tested using four basic statistical tests. Results are compared and it is observed that using a PRNG in the proposed algorithm makes it statistically secured.
منابع مشابه
On the Security of IV Dependent Stream Ciphers
Almost all the existing stream ciphers are using two inputs: a secret key and an initial value (IV). However recent attacks indicate that designing a secure IV-dependent stream cipher and especially the key and IV setup component of such a cipher remains a difficult task. In this paper we first formally establish the security of a well known generic construction for deriving an IV-dependent str...
متن کاملSecure PRNGs from Specialized Polynomial Maps over Any Fq
Berbain, Gilbert, and Patarin presented QUAD, a pseudo random number generator (PRNG) at Eurocrypt 2006. QUAD (as PRNG and stream cipher) may be proved secure based on an interesting hardness assumption about the one-wayness of multivariate quadratic polynomial systems over F2. The original BGP proof only worked for F2 and left a gap to general Fq. We show that the result can be generalized to ...
متن کاملAn Efficient Prng for Stream Ciphers Based on Hybrid Cellular Automata with Nonlinear Feedback
This work proposes a high efficiency PRNG suitable for use in stream ciphers. It is based on hybrid cellular automata with nonlinear feedback to improve its resistance to attacks. It is shown that it can be designed with an arbitrary number N of cells as long as N>Nth with no need for designing a new polynomial like in traditional feedback shift registers (it is easily scalable). The space of t...
متن کاملImplementation of a Stream Cipher Based on Bernoulli's Map
A stream cipher was implemented on a FPGA. The keystream, for some authors the most important element, was developed using an algorithm based on Bernoulli’s chaotic map. When dynamic systems are digitally implemented, a normal degradation appears and disturbs their behavior; for such reason, a mechanism was needed. The proposed mechanism gives a solution for degradation issue and its implementa...
متن کاملSecurity Analysis of Generalized Confidential Modulation
We propose a new evaluation method for ‘generalized confidential modulation (GCM)’ for quantum communication. Confidential modulation realizes a secret communication by using secret information for modulation and noise in a channel. Y-00 is one of the famous methods of GCM for quantum communication. The existing evaluation methods for GCM are based on stream ciphers. They can estimate its analy...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013