Security Primitives: Block And Stream Ciphers
Abstract
Cryptography is fast growing field. To design cryptographically strong and efficient crypto-algorithms, cryptographers should have the understanding of all the latest primitives and how to combine them, and the procedure to check the immunity against all the present day cryptanalytic methods. One is a good cryptographer if one is a good cryptanalyst and vice versa. This paper examines different design primitives adopted by of various existing block ciphers and stream ciphers and the comparative analysis is illustrated based on different parameters. These primitives can be advantageous in developing a new hybrid crypto-algorithm which is secure and immune to various cryptanalytic attacks.
References (29)
- B. A. Forouzan, Cryptography and Network Security, Tata McGraw-Hill, 2008.
- National_Bureau_of_Standards, "Data Encryption Standard (DES)," Information Processing Standard publications 46, 1997.
- F. I. P. S. P. F. 197, Advanced Encryption Standard (AES), 26 Nov (2001).
- B. Schneier, "Description of a New Variable-Length Key, 64-Bit Block cipher(Blowfish)," Fast Software Encryption, Cambridge Security Workshop Proceedings, no. Springer-Verlag, 1994, pp. 191-204, December 1993.
- B. Schneier, "The Blowfish Encryption Algorithm," Dr. Dobb's Journal, vol. 19, pp. 38-40, april 1994.
- M. H. S. a. A. R. Reddy2, "Performance Analysis of AES and MARS Encryption," IJCSI International Journal of Computer Science Issues, vol. 8, no. 4, July 20114.
- M. S. A. B. M. Ahmed Helmy, "A Metamorphic-Enhanced MARS Block Cipher," The International Journal of Computer Science and Communication Security (IJCSCS), July 2013.
- E. B. L. K. Ross Anderson, "Serpent: A Proposal for the Advanced Encryption Standard," [Online]. Available: http://www.cl.cam.ac.uk/rja14/serpent.html.
- R. A. L. K. E Biham, "Serpent: A New Block Cipher Proposal", in Fast Software Encryption- FSE," Springer LNCS , vol. 1372, pp. 222-238, 98.
- M. R. R. S. a. Y. Y. Ronald L. Rivest, The RC6 Block Cipher, v1.1, August 20, 1998.
- C. A. Serge Mister, Practical S-Box Design, Canada.
- D. Mukhopadhyay, Overview on S-Box Design.
- T. W. C. a. P. Stanica, Cryptographic Boolean Functions and Applications, Elsevier, 2009.
- F. M. Mohammad Ubaidullah Bokhari, "Comparative Analysis of Structures And Attacks on Various Stream Ciphers," in Proceedings of the 4th National Conference; INDIACom-2010 Computing For Nation Development, February 25 -26, 2010.
- H. Wu, The Stream Cipher HC-128, eStream Project, 2004.
- D. J. Bernstein, The Salsa20 Stream Cipher, Symmetric Key Encryption Workshop, 2005, 481 Mehak Khurana, Meena Kumari Workshop Record, 2005.
- D. Bernstein., ""Salsa20 Specification"," [Online]. Available: " Available at http://cr.yp.to/snuffle/spec.pdf.
- D. Bernstein., ""Salsa20 design."," [Online]. Available: Available at http://cr.yp.to/snuffle/design..
- C. B. e. al., ""Sosemanuk, a fast software-oriented stream cipher"," eSTREAM, the ECRYPT Stream Cipher Project, Report 2005/027, 2005.
- M. V. T. C. Z. Martin Boesgaard, The Stream Cipher Rabbit, http://www.ecrypt.eu.org/stream/p3ciphers/rabbit/rabbit_p3.pdf, 2005.
- T. J. W. M. Martin Hell, Grain -A Stream Cipher for Constrained Environments, 2005-04-29.
- M. S.H.Babbage, The stream cipher MICKEY 2.0,, ECRYPT stream cipher, http://www.ecrypt.eu.org/stream/ciphers/mickey128/mickey128.pdf, 2005.
- C. D. C. a. B. Preneel, " "Trivium-A Stream Cipher Construction Inspiredby Block Cipher Design Principles,"," http://www.ecrypt.eu.org/stream.
- C. D. C. &. B. Preneel., "TRIVIUM Specifications.," eSTREAM, ECRYPT Stream Cipher Project,, Report2005/001, 2005..
- D. I. Kumar, Cryptology-System Identification and Key Clustering, United States of America: Aegean Park Press, 1997.
- M. Robshaw, "Stream Ciphers," RSA Laboratories, July 25, 1995.
- P. G. a. S. Mesnager, Non-Linearity and Security of Self Synchronizing Stream Ciphers, Belgium: 2005 International Symposium on Nonlinear Theory and its Applications (NOLTA2005)Bruges,, October-2005.
- "The eSTREAM Project".
- Dimple, "ENCRYPTION USING DIFFERENT TECHNIQUES: A REVIEW," International Journal in Multidisciplinary and Academic Research (SSIJMAR), vol. 2, no. January- February(ISSN 2278 -5973), 2013.