Skip to main content

Research on a Novel Hashing Stream Cipher

  • Conference paper
Computational Intelligence and Security (CIS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4456))

Included in the following conference series:

  • 963 Accesses

Abstract

A stream cipher namely the HSC (Hashing Stream Cipher) which uses a regular one-way hash function to generate pseudorandom keystream iteratively is proposed. Since the timestamp is used in the keystream generator, the algorithm achieves the robustness against the adaptive-chosen-plaintext attack. The one-way hash function is the core of the algorithm, so the security analysis of the algorithm is shifted to that of the hash function. If the core one-way hash function is chosen properly, it can be asserted that there would be no period in the HSC keystream. Firstly the algorithm was introduced detailedly. Then its applying security and efficiency respectively discussed deeply. The experimental result shows that the algorithm has both a high security and good efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Rueppel, R.A.: Security Models and Notions for Stream Ciphers. In: Mitchell, C. (ed.) Cryptography and Coding II, Clarendon Press, Oxford (1992)

    Google Scholar 

  2. Rueppel, R.A.: Stream Ciphers. In: Simmons, G.J. (ed.) Contemporary Cryptology: The Science of Information Integrity, IEEE Press, New York (1992)

    Google Scholar 

  3. Schneier, B.: Applied Cryptography, Second Edition: Protocols, Algorithms, and Source Code in C. In: Wiley Computer Publishing, John Wiley & Sons, New York (1996)

    Google Scholar 

  4. Massey, J.L.: Shift–Register Synthesis and BCH Decoding. IEEE Transactions on Information Theory IT–15(1), 122–127 (1969)

    Article  MathSciNet  Google Scholar 

  5. Hongjun Wu.: The Misuse of RC4 in Microsoft Word and Excel. Institute for Infocomm Research, Singapore (2005)

    Google Scholar 

  6. Fluhrer, S., Mantin, I., Shamir, A.: Weaknesses in the Key Scheduling Algorithm of RC4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 1–24. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  7. Stubblefield, A., Ioannidis, J., Rubin, A.D.: A Key Recovery Attack on the 802.11b Wired Equivalent Privacy Protocol (WEP). In: ACM Transactions on Information and System Security (TISSEC), vol. 7(2), pp. 319–332. ACM Press, New York (2004)

    Google Scholar 

  8. Goldreich, O.: Foundations of Cryptography Basic Tools. Cambridge University Press, Cambridge (2001)

    Book  MATH  Google Scholar 

  9. Rosiello, A.P. E., Carrozzo, R.: ARC: A Synchronous Stream Cipher from Hash Functions. Rosiello Security (2005)

    Google Scholar 

  10. Secure Hash Standard. Federal Information Processing Standards Publication 180-2 (2002)

    Google Scholar 

  11. Stinson, D.R.: Cryptography Theory and Practice, 2nd edn. CRC Press, Boca Raton (2002)

    Google Scholar 

  12. Dasgupta, A.: Analysis of Different Types of Attacks on Stream Ciphers and Evaluation and Security of Stream Ciphers (2005), http://www.securitydocs.com/library/3235

  13. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. NIST Special Publication 800-22 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, Jc., Li, Cm. (2007). Research on a Novel Hashing Stream Cipher. In: Wang, Y., Cheung, Ym., Liu, H. (eds) Computational Intelligence and Security. CIS 2006. Lecture Notes in Computer Science(), vol 4456. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74377-4_51

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74377-4_51

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74376-7

  • Online ISBN: 978-3-540-74377-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics