Academia.eduAcademia.edu

Stream Cipher

description2,068 papers
group104 followers
lightbulbAbout this topic
A stream cipher is a method of encryption that converts plaintext into ciphertext by combining it with a pseudorandom key stream, typically one bit or byte at a time. This technique allows for the secure transmission of data in real-time, ensuring confidentiality and integrity during communication.
lightbulbAbout this topic
A stream cipher is a method of encryption that converts plaintext into ciphertext by combining it with a pseudorandom key stream, typically one bit or byte at a time. This technique allows for the secure transmission of data in real-time, ensuring confidentiality and integrity during communication.

Key research themes

1. How are stream ciphers designed for hardware-constrained environments such as RFID and IoT devices?

This research area addresses the challenge of designing stream ciphers that achieve secure and efficient encryption in environments with severely limited resources like gate count, power consumption, and memory. Given the proliferation of IoT and RFID devices with stringent hardware constraints, there is substantial activity focusing on lightweight stream ciphers optimized at the hardware level to balance security and implementation cost.

Key finding: Presented Grain, a bit-oriented synchronous stream cipher based on two 80-bit shift registers (LFSR and NFSR) with a nonlinear filter function, specifically designed for extremely constrained hardware environments like RFID... Read more
Key finding: Introduced the VEST family of stream ciphers that use bijective nonlinear parallel feedback shift registers combined with non-linear RNS-based counters to construct hardware-efficient ciphers with guaranteed long periods and... Read more
Key finding: Proposed a hardware implementation of the Mickey-128 stream cipher on an Artix-7 FPGA incorporating unrolling to boost throughput, achieving up to 10.23 Gbps with minimal area usage (<1% of chip slices). This demonstrates how... Read more
Key finding: Presented ANCHOR, a lightweight, high-speed stream cipher carefully designed with building blocks exhibiting strong cryptographic properties, and validated via NIST statistical tests and linear complexity measures. It targets... Read more

2. How can domain-specific modeling languages and chaos-based methods improve the design and security evaluation of stream ciphers?

This theme explores novel methodological approaches to easing the design, implementation, and assessment of stream ciphers by leveraging graphical domain-specific modeling languages (DSMLs) and chaotic systems for key stream generation. These approaches aim to reduce errors, enhance expressiveness, and introduce strong statistical properties and unpredictability into cipher designs. The research underscores the intersection of software engineering methods with cryptographic security analysis.

Key finding: Developed SCLang, a graphical DSML enabling domain specialists and non-technical users to model stream cipher construction using six different keystream generation methods and integrate NIST statistical tests for randomness... Read more
Key finding: Proposed a stream cipher using a strong pseudo-chaotic number generator combining two chaotic maps (Piece-Wise Linear Chaotic Map and Skew Tent map) with coupling and swapping to produce a high-quality key stream. The... Read more
Key finding: Enhanced the security of the classical RC4 stream cipher by incorporating chaotic maps (Henon and sine maps) for robust key generation, increasing randomness and key space size. The scheme encrypts data prior to embedding in... Read more

3. What are the design strategies and performance trade-offs for fast and secure stream ciphers in software implementations?

This area involves designing stream ciphers that excel in software environments requiring both speed and security, employing novel algorithmic structures, combinations of existing ciphers, or optimized primitives. The research includes performance evaluations against standard statistical tests and comparisons with existing ciphers to ensure practical usability in general-purpose computing and real-time communication systems.

Key finding: Proposed COZMO, a hybrid lightweight stream cipher combining Trivium and A5/1 algorithms, where the output bits of Trivium serve as inputs to A5/1’s registers. This integration enhances the security by mitigating known... Read more
Key finding: Designed MAJE4 as a 128- or 256-bit key stream cipher optimized for 32-bit processors. It uses primitive computational operations (+, XOR, shifts) to produce pseudorandom keys with good distribution and large period while... Read more
Key finding: Implemented the Salsa20 stream cipher for encrypting color images at byte-level based on RGB decomposition, using hashed keys for encryption and decryption. Empirical results demonstrate high security and image quality... Read more
Key finding: Presented a lightweight image encryption scheme combining ChaCha20 key generation with the 16-round Serpent block cipher to provide robust security and resistance to known/chosen plaintext attacks. Security assessed by... Read more

All papers in Stream Cipher

Information security is dependent on various access control mechanism governed by cryptography or the art of encryption and decryption. Cryptography is the largely built in computer hardware or in software using various discrete... more
The development of technology at this time allows everyone to exchange information without any limitation of time and distance. The possibility that data leakage will occur during the process of exchanging information is carried out,... more
In this paper we describe how to use special induced subgraphs of generalized m-gons to obtain the LDPC error correcting codes. We compare the properties of codes related to the affine parts of q-regular generalised 6-gons with the... more
In this paper we investigate correcting properties of LDPC codes obtained from families of algebraic graphs. The graphs considered in this article come from the infinite incidence structure. We describe how to construct these codes,... more
In this paper we present an algorithm to compute keyed hash function (message authentication code MAC). Our approach uses a family of expander graphs of large girth denoted D(n, q), where n is a natural number bigger than one and q is a... more
The problem of searching for aperiodic binary sequences with high entropy and uniform element distribution presents significant computational complexity, particularly as the sequence length increases. Such sequences are of crucial... more
The paper presents a detailed analysis of two types of pseudorandom binary sequence generators obtained by using tent map. The test is performed using a NIST statistical test suite which is widely used for testing the randomness of any... more
RF TEMPEST attacks, as a subset of side-channel attacks, i.e. wireless eavesdropping on unwanted residual RF signals emanating from electronic devices (with the intention to steal secret data) have been around since 1916. Many electronic... more
In this paper, we construct a fully homomorphic encryption (FHE) scheme over integers with the message space Z Q for any prime Q. Even for the binary case Q = 2, our decryption circuit has a smaller degree than that of the previous... more
En el año 2012 la International Organization for Standardization (ISO) y la International Electrotechnical Commission (IEC) han publicado la norma ISO/IEC 29192-3:2012. En ella se especifican dos algoritmos de cifrado de flujo para ser... more
The paper presents a new approach for triple key generation techniques with Henon, Lozi and Duffing chaotic maps in FPGA. Three key streams generated by XORing chaotic maps with pseudo random number generators, the results of XORing PN1... more
Optimization remains a cornerstone of modern engineering and computational intelligence, playing a vital role in the design, control, and allocation of limited resources across industries ranging from logistics to structural engineering.... more
While the A5/1 stream cipher encryption is known to aid in providing security and privacy for the mobile communication, it actually has numerous security vulnerabilities that leave it susceptible to attacks. Although newer technology... more
Chaos has suggested some new and efficient way to develop image encryption technique. It is because chaos has a chaotic random characteristic. Therefore chaos often is used as a random generator in image encryption and decryption. One of... more
The first part of this paper considers the diamond structures which were first introduced and applied in the herding attack by Kelsey and Kohno . We present a new method for the construction of a diamond structure with 2 d chaining values... more
This paper proposes a Driverless Intelligent Vehicle that has an onboard GPS equipped autopilot system, which is capable of driving the vehicle from one point to another without human operator and also with a theft control system for an... more
Cryptographic protocols with adaptive security ensure that security holds against an adversary who can dynamically determine which parties to corrupt as the protocol progresses-or even after the protocol is finished. In the setting where... more
The associated codes of almost perfect nonlinear (APN) functions have been widely studied. In this paper, we consider more generally the codes associated with functions that have differential uniformity at least 4. We emphasize, for such... more
This paper shows that Physics is very close to the substitution-diffusion paradigm of symmetric ciphers. Based on this analogy, we propose a new cryptographic algorithm. Statistical Physics gives design principles to devise fast, scalable... more
Cryptography is a science concerned with securing data transmission. By applying cryptographic operations to data, readable information is converted into unreadable data. Currently, security is of great importance. Data transferred over... more
Boolean networks are used to model biological networks such as gene regulatory networks. Often Boolean networks show very chaotic behaviour which is sensitive to any small perturbations. In order to reduce the chaotic behaviour and to... more
Due to practical constraints in preventing phishing through public network or insecure communication channels, simple physical unclonable function (PUF)-based authentication protocol with unrestricted queries and transparent responses is... more
Because of the tremendous rise in internet-based cybercrime, the safety of data is becoming increasingly important in order for the internet to continue providing its many features and benefits. The largest problem for data owners and... more
A proposed stream cipher, RRSC-128AEAD, supports authenticated encryption with associated data (AEAD) for checking both the authenticity and integrity of the message. This cipher includes a key and a nonce of size 128-bit each as input.... more
The focus of this work is to provide authentication and confidentiality of messages in a swift and cost effective manner to suit the fast growing Internet applications. A nested hash function with lower computational and storage demands... more
A new fast stream cipher, MAJE4 is designed and developed with a variable key size of 128-bit or 256-bit. The randomness property of the stream cipher is analysed by using the statistical tests. The performance evaluation of the stream... more
A novel stream cipher based on the popular linear feedback shift register (LFSR) with a dynamic feedback network controlled by a decoder circuit is presented. The proposed circuit can be employed efficiently in cryptographic applications... more
At this time the security of communication can be the important role of electronic communication. In this paper we can discuss the new transform for the protection of digital signals using with golden matrix. Fibonacci - Pell (FP)... more
This paper aims at overcoming the shortcomings of RC4 (Rivest Cipher 4) algorithm that mainly resides in the &quot;key scheduling algorithm&quot; (KSA) of RC4. This paper is a trial to enhance key generation of RC4 on the basis of... more
In recent years, because of the frequent flow of digital images across the world over the transmission media, image encryption become one of the most substantial topics. In this paper, we propose a new image encryption method based on the... more
Contemporary data centers implement hybrid storage systems that consist of layers from solid-state drives (SSDs) and hard disk drives (HDDs). Due to their high data retrieval speed, SSDs layer is used to store important data blocks that... more
In the 4.0 industrial revolution, technologies are designed to be able to connect to the internet. These technologies should be able to exchange data between them using sensors and others. One of the ways to send it is by the wireless... more
Impossible-differential cryptanalysis is one of the powerful methods utilized for evaluating the robustness of block ciphers; however, mCrypton is one of the block ciphers whose master key has not been recovered with this method in the... more
A smart card is a small pocket-sized computer with limited resources used for secure data processing and storage. The card consists of different software and hardware components, including a microprocessor, crypto co-processor, RAM,... more
Side Channel Attack (SCA) exploits the physical information leakage (such as electromagnetic emanation) from a device that performs some cryptographic operation and poses a serious threat in the present IoT era. In the last couple of... more
We present an overview of Λ-type operations on the algebra of quasi-symmetric functions. Nous présentons un survol de l'ensemble des propriétés de type Λ-anneau de l'algèbre des fonctions quasi-symétriques.
Now a days, Hill cipher is almost relegated. It is mostly referred to as a reference or rather history material. This is due to its weaknesses in terms of security, difficulty in both the multiplication and inverse computation of... more
Information safety plays an important role in modern technologies. A stream encryption is one of the common means for information safety support. The sequences with pseudo-random characteristics are often required in the algorithms of... more
SNOW 3G is a synchronous, word-oriented stream cipher used by the 3GPP standards as a confidentiality and integrity algorithms. It is used as first set in long term evolution (LTE) and as a second set in universal mobile... more
This paper proposes a novel method of message cryptography aiming to provide a simple, secure, and highly efficient approach to encryption and decryption. Unlike existing methods that rely on complex logical operations, our method... more
Fast and secure data stored and transmission through a modern communication and information system are the core objective in this area. With regard to this study, efficient and simple algorithm has been suggested that takes advantage of... more
HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or... more
The Integer Dichotomy Diagram IDD(n) represents a natural number n ∈ N by a Directed Acyclic Graph in which equal nodes are shared to reduce the size s(n). That IDD also represents some finite set of integers by a Digital Search DAG where... more
Cybersecurity threats are evolving at a very high rate, thus requiring the use of new methods to enhance the encryption of data and the communication process. In this paper, we propose a new key generation algorithm using the simultaneous... more
This paper provides novel hardware design for frequency-hopping pseudorandom bit generator (PRBG).PRBG design by chaotic maps on FPGA.Two proposed methods in this work first combine chaotic maps in a cascade manner called fixed point... more
A Stream Cipher (SC) is a symmetric-key encryption type that scrambles each piece of data in clear text to conceal it from hackers. Despite its advantages, it has a substantial challenge. Correct handwriting of the script code for the... more
Data management and storage have undergone a revolution with the introduction of cloud computing, which has made strong encryption methods necessary to guarantee data security. The use of the Triple Data Encryption Standard (3DES) method... more
Download research papers for free!