Hiji-bij-bij: A New Stream Cipher with a Self-synchronizing Mode of Operation

  • Palash Sarkar
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2904)


In this paper, we present a new stream cipher called Hiji-bij-bij (HBB). The basic design principle of HBB is to mix a linear and a nonlinear map. Our innovation is in the design of the linear and the nonlinear maps. The linear map is realised using two 256-bit maximal period 90/150 cellular automata. The nonlinear map is simple and consists of several alternating linear and nonlinear layers. We prove that the mixing achieved by the nonlinear map is complete and the maximum bias in any non-zero linear combination of the input and output bits of the nonlinear map is at most 2− 13. We also identify a self synchronizing (SS) mode of operation for HBB. The performance of HBB is reasonably good in software and is expected to be very fast in hardware. To the best of our knowledge, a generic exhaustive search seems to be the only method of attacking the cipher.


stream cipher self-synchronization cellular automata 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Chepyzhov, V.V., Johansson, T., Smeets, B.: A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 181–195. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  2. 2.
    Coppersmith, D., Halevi, S., Jutla, C.: Cryptanalysis of stream ciphers with linear masking. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, p. 515. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  3. 3.
    Coppersmith, D., Halevi, S., Jutla, C.: Scream: a software efficient stream cipher. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 195–209. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  4. 4.
    Courtois, N., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 345–359. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  5. 5.
    Daemen, J., Rijmen, V.: The design of Rijndael. Springer Verlag Series on Information Security and Cryptography (2002) ISBN 3-540-42580-2Google Scholar
  6. 6.
    Ekdahl, P., Johansson, T.: SNOW - a new stream cipher. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, Springer, Heidelberg (2003)CrossRefGoogle Scholar
  7. 7.
    Golic, J.D.: Modes of Operation of Stream Ciphers. In: Proceedings of Selected Areas in Cryptography 2000, pp. 233–247 (2000)Google Scholar
  8. 8.
    Jutla, C.S.: Encryption Modes with Almost Free Message Integrity. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 529–544. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  9. 9.
    Nyberg, K.: Differentially Uniform Mappings for Cryptography. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 55–64. Springer, Heidelberg (1994)Google Scholar
  10. 10.
    Rose, G., Hawkes, P.: Turing, a high performance stream cipher. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 290–306. Springer, Heidelberg (2003) (to appear), Also available as IACR technical report,, number2002/185CrossRefGoogle Scholar
  11. 11.
    Sarkar, P.: The filter-combiner model for memoryless synchronous stream ciphers. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, p. 533. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  12. 12.
    Sarkar, P.: Computing shifts in 90/150 cellular automata sequences. Finite Fields and their Applications 9(2), 175–186 (2003)zbMATHCrossRefMathSciNetGoogle Scholar
  13. 13.
    Tezuka, S., Fushimi, M.: A method of designing cellular automata as pseudo random number generators for built-in self-test for VLSI. In: Finite Fields: Theory, Applications and Algorithms, Contemporary Mathematics, AMS, pp. 363–367 (1994)Google Scholar
  14. 14.
    Watanabe, D., Furuya, S., Yoshida, H., Preneel, B.: A new keystream generator MUGI. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 179–194. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  15. 15.
    Zhang, M., Caroll, C., Chan, A.: The software-oriented stream cipher SSC2. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 31–48. Springer, Heidelberg (2001)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Palash Sarkar
    • 1
  1. 1.Cryptology Research Group, Applied Statistics UnitIndian Statistical InstituteKolkataIndia

Personalised recommendations