Recent advances in lightweight stream ciphers
Tóm tắt
In this era of cutting edge computing research, there have been gigantic advancements in ubiquitous and pervasive computing. Due to mass deployment of these devices, there have been multifarious constraints in terms of memory, computing power, and battery supply coupled with an inherent need for security. This calls for the design and development of lightweight ciphers so as to ensure security and integrity of the information being shared. There have been numerous attempts to create these security protocols. Two of the most popular primitives are block cipher and stream cipher. In this paper, we study stream ciphers like Grain, Trivium, Mickey, and Fruit, and do a comparative analysis on them.
Tài liệu tham khảo
CryptoLUX, University of Luxembourg https://www.cryptolux.org/index.php/. Lightweight_Cryptography4
Daemen J, Rijmen V (2003) AES proposal: Rijndael. National Institute of Standards and Technology. p. 1. Retrieved 21 Feb 2013
CryptoLUX, University of Luxembourg https://www.cryptolux.org/index.php/. Lightweight_Stream_Ciphers
CryptoLUX, University of Luxembourg https://www.cryptolux.org/index.php/. Lightweight_Block_Ciphers
Hell M, Johansson T, Meier W (2007) Grain: a stream cipher for constrained environments. Int J Wirel Mob Comput 2(1):8693
Babbage S, Dodd M (2006) The stream cipher MICKEY 2.0 ECRYPT Stream Cipher Project Report. http://www.ecrypt.eu.org/stream/p3ciphers/mickey/mickey_p3
De Cannière C (2006) Trivium: a stream cipher construction inspired by block cipher design principles. In: Information Security, Springer: Berlin, pp 171–186
Hell M, Jonasson T, Meier W (2005) Grain: a stream cipher for constrained environments. ECRYPT Stream Cipher Project Report 2005/001. Available at http://www.ecrypt.eu.org/stream
Berbain C, Gilbert H, Maximov A (2006) Cryptanalysis of grain. In: Fast software encryption. Springer, Berlin, pp 15–29
Dinur I, Shamir A (2011) Breaking grain-128 with dynamic cube attacks. In: Fast software encryption. Springer, Berlin, pp 167–187
Maximov A, Biryukov A (2007) Two trivial attacks on trivium. Cryptology ePrint (Table 6, page 11)
Vielhaber M (2007) Breaking ONE.FIVIUM by AIDA an algebraic IV differential attack. Cryptology eprint https://eprint.iacr.org/2007/413.pdf
Vielhaber M (2009) Shamir’s “cube attack”: a remake of AIDA, the algebraic IV differential attack
Ghafari VA, Hu H, Xie C (2016) Fruit: ultra-lightweight stream cipher with shorter internal state. Cryptology ePrint https://eprint.iacr.org/2016/355.pdf
Bainik S, Maitra S, Sarkar S (2013) Improved differential fault attack on MICKEY 2.0. Cryptology ePrint http://eprint.iacr.org/2013/029
UEA2&UIA IA (2006) Specification of the 3GPP confidentiality and integrity algorithms UEA2& UIA2. Document 2: SNOW 3G Speci cations. Version: 1.1. ETSI
Bernstein DJ (2008) The Salsa20 family of stream ciphers. In: Lecture notes in computer science (LNCS), vol 4986. doi:10.1007/978-3-540-68351-3_8