Decimv2

  • Côme Berbain
  • Olivier Billet
  • Anne Canteaut
  • Nicolas Courtois
  • Blandine Debraize
  • Henri Gilbert
  • Louis Goubin
  • Aline Gouget
  • Louis Granboulan
  • Cédric Lauradoux
  • Marine Minier
  • Thomas Pornin
  • Hervé Sibert
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4986)

Abstract

In this paper, we present Decimv2, a stream cipher hardware-oriented selected for the Phase 3 of the ECRYPT stream cipher project eSTREAM. As required by the initial call for hardware-oriented stream cipher contribution, Decimv2 manages 80-bit secret keys and 64-bit public initialization vectors. The design of Decimv2 combines two filtering mechanisms: a nonlinear Boolean filter over a LFSR, followed by an irregular decimation mechanism called the ABSG. Since designers have been invited to demonstrate flexibility of their design by proposing variants that take 128-bit keys, we also present a 128-bit security version of Decim called Decim-128.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    eStream, Stream cipher project of the European Network of Excellence in Cryptology ECRYPT, http://www.ecrypt.eu.org/stream/
  2. 2.
    Batina, L., Lano, J., Örs, S.B., Preneel, B., Verbauwhede, I.: Energy, perfomance, area versus security trade-offs for stream ciphers. In: The State of the Art of Stream Ciphers: Workshop Record, Brugge, Belgium, October 2004, pp. 302–310 (2004)Google Scholar
  3. 3.
    Berbain, C., Billet, O., Canteaut, A., Courtois, N., Debraize, B., Gilbert, H., Goubin, L., Gouget, A., Granboulan, L., Lauradoux, C., Minier, M., Pornin, T., Sibert, H.: Decim– A new Stream Cipher for Hardware applications. In: ECRYPT Stream Cipher Workshop SKEW 2005 (2005), http://www.ecrypt.eu.org/stream/
  4. 4.
    Berbain, C., Billet, O., Canteaut, A., Courtois, N., Debraize, B., Gilbert, H., Goubin, L., Gouget, A., Granboulan, L., Lauradoux, C., Minier, M., Pornin, T., Sibert, H.: Decim-128 (2007), http://www.ecrypt.eu.org/stream/
  5. 5.
    Berbain, C., Billet, O., Canteaut, A., Courtois, N., Debraize, B., Gilbert, H., Goubin, L., Gouget, A., Granboulan, L., Lauradoux, C., Minier, M., Pornin, T., Sibert, H.: Decim v2. In: ECRYPT Stream Cipher Workshop SASC (2007), http://www.ecrypt.eu.org/stream/
  6. 6.
    De Cannière, C., Lano, J., Preneel, B.: Comments on the rediscovery of Time Memory Data Tradeoffs (2005), http://www.ecrypt.eu.org/stream/TMD.pdf
  7. 7.
    Coppersmith, D., Krawczyk, H., Mansour, Y.: The shrinking generator. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 22–39. Springer, Heidelberg (1994)Google Scholar
  8. 8.
    Ekdahl, P., Johansson, T., Meier, W.: Predicting the shrinking generator with fixed connections. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 345–359. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  9. 9.
    Gouget, A., Sibert, H.: The Bit-Search Generator. In: The State of the Art of Stream Ciphers: Workshop Record, Brugge, Belgium, October 2004, pp. 60–68 (2004)Google Scholar
  10. 10.
    Gouget, A., Sibert, H.: How to strengthen pseudo-random generators by using compression. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 129–146. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  11. 11.
    Gouget, A., Sibert, H.: Revisiting correlation-immunity in filter generators. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol. 4876. Springer, Heidelberg (2007)Google Scholar
  12. 12.
    Gouget, A., Sibert, H., Berbain, C., Courtois, N., Debraize, B., Mitchell, C.: Analysis of the Bit-Search Generator and sequence compression techniques. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 196–214. Springer, Heidelberg (2005)Google Scholar
  13. 13.
    Hong, J., Sarkar, P.: Rediscovery of Time Memory Tradeoffs (2005), http://eprint.iacr.org/2005/090.ps
  14. 14.
    Meier, W., Staffelbach, O.: The self-shrinking generator. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 205–214. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  15. 15.
    Wu, H., Preneel, B.: Cryptanalysis of the stream cipher decim. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol. 4047, pp. 30–40. Springer, Heidelberg (2006)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Côme Berbain
    • 1
  • Olivier Billet
    • 1
  • Anne Canteaut
    • 2
  • Nicolas Courtois
    • 3
  • Blandine Debraize
    • 4
    • 5
  • Henri Gilbert
    • 1
  • Louis Goubin
    • 4
    • 5
  • Aline Gouget
    • 4
  • Louis Granboulan
    • 6
  • Cédric Lauradoux
    • 2
  • Marine Minier
    • 7
  • Thomas Pornin
    • 8
  • Hervé Sibert
    • 9
  1. 1.Orange LabsFrance
  2. 2.INRIA RocquencourtFrance
  3. 3.University College of LondonUnited Kingdom
  4. 4.GemaltoFrance
  5. 5.Université de VersaillesFrance
  6. 6.EADSFrance
  7. 7.INSA LyonFrance
  8. 8.Cryptolog InternationalFrance
  9. 9.NXP SemiconductorsFrance

Personalised recommendations