Recent advances in lightweight stream ciphers

Springer Science and Business Media LLC - Tập 4 - Trang 173-176 - 2016
Akshay Bhasin1, Girish Mishra2
1Department of Computer Science and Engineering, Birla Institute of Technology Mesra, Ranchi, India
2Scientist Analysis Group, Defence Research & Development Organization, Delhi, India

Tóm tắt

In this era of cutting edge computing research, there have been gigantic advancements in ubiquitous and pervasive computing. Due to mass deployment of these devices, there have been multifarious constraints in terms of memory, computing power, and battery supply coupled with an inherent need for security. This calls for the design and development of lightweight ciphers so as to ensure security and integrity of the information being shared. There have been numerous attempts to create these security protocols. Two of the most popular primitives are block cipher and stream cipher. In this paper, we study stream ciphers like Grain, Trivium, Mickey, and Fruit, and do a comparative analysis on them.

Tài liệu tham khảo

CryptoLUX, University of Luxembourg https://www.cryptolux.org/index.php/. Lightweight_Cryptography4 Daemen J, Rijmen V (2003) AES proposal: Rijndael. National Institute of Standards and Technology. p. 1. Retrieved 21 Feb 2013 CryptoLUX, University of Luxembourg https://www.cryptolux.org/index.php/. Lightweight_Stream_Ciphers CryptoLUX, University of Luxembourg https://www.cryptolux.org/index.php/. Lightweight_Block_Ciphers Hell M, Johansson T, Meier W (2007) Grain: a stream cipher for constrained environments. Int J Wirel Mob Comput 2(1):8693 Babbage S, Dodd M (2006) The stream cipher MICKEY 2.0 ECRYPT Stream Cipher Project Report. http://www.ecrypt.eu.org/stream/p3ciphers/mickey/mickey_p3 De Cannière C (2006) Trivium: a stream cipher construction inspired by block cipher design principles. In: Information Security, Springer: Berlin, pp 171–186 Hell M, Jonasson T, Meier W (2005) Grain: a stream cipher for constrained environments. ECRYPT Stream Cipher Project Report 2005/001. Available at http://www.ecrypt.eu.org/stream Berbain C, Gilbert H, Maximov A (2006) Cryptanalysis of grain. In: Fast software encryption. Springer, Berlin, pp 15–29 Dinur I, Shamir A (2011) Breaking grain-128 with dynamic cube attacks. In: Fast software encryption. Springer, Berlin, pp 167–187 Maximov A, Biryukov A (2007) Two trivial attacks on trivium. Cryptology ePrint (Table 6, page 11) Vielhaber M (2007) Breaking ONE.FIVIUM by AIDA an algebraic IV differential attack. Cryptology eprint https://eprint.iacr.org/2007/413.pdf Vielhaber M (2009) Shamir’s “cube attack”: a remake of AIDA, the algebraic IV differential attack Ghafari VA, Hu H, Xie C (2016) Fruit: ultra-lightweight stream cipher with shorter internal state. Cryptology ePrint https://eprint.iacr.org/2016/355.pdf Bainik S, Maitra S, Sarkar S (2013) Improved differential fault attack on MICKEY 2.0. Cryptology ePrint http://eprint.iacr.org/2013/029 UEA2&UIA IA (2006) Specification of the 3GPP confidentiality and integrity algorithms UEA2& UIA2. Document 2: SNOW 3G Speci cations. Version: 1.1. ETSI Bernstein DJ (2008) The Salsa20 family of stream ciphers. In: Lecture notes in computer science (LNCS), vol 4986. doi:10.1007/978-3-540-68351-3_8