Advertisement

VMPC One-Way Function and Stream Cipher

  • Bartosz Zoltak
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3017)

Abstract

A simple one-way function along with its proposed application in symmetric cryptography is described. The function is computable with three elementary operations on permutations per byte. Inverting the function, using the most efficient method known to the author, is estimated to require an average computational effort of about 2260 operations. The proposed stream cipher based on the function was designed to be efficient in software implementations and, in particular, to eliminate the known weaknesses of the alleged RC4 keystream generator while retaining most of its speed and simplicity.

Keywords

one-way function stream cipher cryptanalysis RC4 lower bound 

References

  1. 1.
    Knuth, D.E.: The Art of Computer Programming, 3rd edn. Fundamental Algorithms, vol. 1. Addison Wesley Longman, Amsterdam (1997)Google Scholar
  2. 2.
    Knuth, D.E.: The Art of Computer Programming, 3rd edn. Seminumerical Algorithms, vol. 2. Addison Wesley Longman, Amsterdam (1998)Google Scholar
  3. 3.
    Mister, S., Tavares, S.E.: Cryptanalysis of RC4-like Ciphers. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556, p. 131. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  4. 4.
    Knudsen, L.R., Meier, W., Preneel, B., Rijmen, V., Verdoolaege, S.: Analysis Methods for (Alleged) RC4. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 327–341. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  5. 5.
    Fluhrer, S.R., McGrew, D.A.: Statistical Analysis of the Alleged RC4 Keystream Generator. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, p. 19. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  6. 6.
    Mantin, I., Shamir, A.: A Practical Attack on Broadcast RC4. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, p. 152. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  7. 7.
    Fluhrer, S., Mantin, I., Shamir, A.: Weaknesses in the Key Scheduling Algorithm of RC4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, p. 1. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  8. 8.
    Golic, J.D.: Linear Statistical Weakness of Alleged RC4 Keystream Generator. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 226–238. Springer, Heidelberg (1997)Google Scholar
  9. 9.
    Grosul, A.L., Wallach, D.S.: A Related-Key Cryptanalysis of RC4. Technical Report TR-00-358, Department of Computer Science, Rice University (2000)Google Scholar
  10. 10.
    Finney, H.: An RC4 Cycle That Can’t Happen. Post in sci. crypt (1994)Google Scholar
  11. 11.
    Marsaglia, G.: DIEHARD battery of statistical tests with documentation, http://stat.fsu.edu/~geo/diehard.html
  12. 12.
    NIST statistical tests suite with documentation, http://csrc.nist.gov/rng

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Bartosz Zoltak

There are no affiliations available

Personalised recommendations