Abstract
A highly reliable synchronous stream cipher system with absolute synchronization is proposed. The proposed system includes an improved initial synchronization with highly reliable keystream synchronization in a noisy channel (about BER=0.1). Furthermore, encryption algorithms with a LILI-II, a Dragon and a Parallel LM for data confidentiality, and a zero-suppression algorithm for system stabilization are all designed and analyzed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. John Wiley and Sons, Inc., New York (1996)
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Trans. on Infor. Theory IT-22(6), 644–654 (1976)
Rueppel, R.A.: Analysis and Design of Stream Ciphers. Springer, Heidelberg (1986)
Lee, H., Moon, S.: On An Improved Summation Generator with 2-Bit Memory. Signal Processing 80(1), 211–217 (2000)
Tatebayashi, M., Matsuzaki, N., Newman, D.B.: A Cryptosystem using Digital Signal Processors for Mobile Communication. In: ICASSP 1990, pp. 37.1.1 - 37.1.4 (1990)
Lee, H., Moon, S.: A Zero-Suppression Algorithm for the synchronous stream cipher. Applied Signal Processing 5(4), 240–243 (1998)
Moon, S., Lee, P.: A Propose of a Key Distribution Protocol. In: The Proceeding of The Korean Workshop on Information Security and Cryptography, WISC 1990, pp. 117–124 (1990)
Proakis, J.: Digital Communications, 3rd edn. McGraw-Hill, Inc., New York (1995)
van Tilborg, H.C.A.: Fundamentals of Cryptology. Kluwer Academic Publishers, Dordrecht (2000)
Park, B., Choi, H., Chang, T., Kang, K.: Period of Sequences of Primitive Polynomials. Electronics Letters 29(4), 390–391 (1993)
Beker, H.J., Piper, F.C.: Secure Speech Communications. Academic Press, London (1985)
NIST, Announcing the Advanced Encryption Standard (AES), FIPS-197 (November 2001)
KISA, Development of SEED, the 128-bit block cipher standard, (October 1998), http://www.kisa.or.kr
Clark, A., Dawson, E., Fuller, J., Golić, J.D., Lee, H.-J., Millan, W.L., Moon, S.-J., Simpson, L.R.: The LILI-II keystream generator. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol. 2384, pp. 25–39. Springer, Heidelberg (2002)
Lee, H., Moon, S.: Parallel Stream Cipher for Secure High-Speed Communications. Signal Processing 82(2), 259–265 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, H. (2006). Highly Reliable Synchronous Stream Cipher System for Link Encryption. In: Gavrilova, M., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3982. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751595_30
Download citation
DOI: https://doi.org/10.1007/11751595_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34075-1
Online ISBN: 978-3-540-34076-8
eBook Packages: Computer ScienceComputer Science (R0)