Advertisement

New Approaches to the Design of Self-Synchronizing Stream Ciphers

  • Ueli M. Maurer
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 547)

Abstract

Self-synchronizing stream ciphers (SSSC) are a commonly used encryption technique for channels with low bit error rate but for which bit synchronization can present a problem. Most presently used such ciphers are based on a block cipher (e.g. DES) in 1-bit cipher feedback mode. In this paper, several alternative design approaches for SSSCs are proposed that are superior to the design based on a block cipher with respect to encryption speed and potentially also with respect to security. A method for combining several SSSCs is presented that allows to prove that the combined SSSC is at least as secure as any of the component ciphers. The problem of designing SSSCs is contrasted with the problem of designing conventional synchronous additive stream ciphers and it is shown that different security criteria must be applied.

Furthermore, an efficient algorithm is presented for finding a function of low degree that approximates a given Boolean function, if such an approximation exists. Its significance for the cryptographic security of SSSCs and its applications in coding theory are discussed.

Keywords

Boolean Function Block Cipher Finite Automaton Stream Cipher Parallel Composition 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. [1]
    H. Beker and F. Piper, Cipher systems: the protection of communications, New York, NY: Van Nostrand, 1982.zbMATHGoogle Scholar
  2. [2]
    E.R. Berlekamp, R.J. McEliece and H.C.A. van Tilborg, On the inherent intractability of certain coding problems, IEEE Transactions on Information Theory, vol. 24, pp. 384–386, 1978.zbMATHCrossRefGoogle Scholar
  3. [3]
    R.E. Blahut, Theory and practice of error control codes, Reading, MA: Addison-Wesley, 1984.Google Scholar
  4. [4]
    E. Biham and A. Shamir, Differential analysis of DES-like cryptosystems, presented at CRYPTO’90 (to appear in the proceedings).Google Scholar
  5. [5]
    D.E.R. Denning, Cryptography and data security, Reading, MA: Addison-Wesley, 1982.zbMATHGoogle Scholar
  6. [6]
    O. Goldreich, S. Goldwasser and S. Micali, How to construct random functions, Journal of the ACM, vol. 33, no. 4, pp. 792–807, Oct. 1986.CrossRefMathSciNetGoogle Scholar
  7. [7]
    H.-J. Klemenz and W.R. Widmer, Swiss Patent Nr. CH 658 759 A5.Google Scholar
  8. [8]
    V.I. Korzhik and A.I. Turkin, Cryptanalysis of McEliece’s public-key cryptosystem, these proceedings.Google Scholar
  9. [9]
    M. Luby and C. Rackoff, How to construct pseudorandom permutations from pseudorandom functions, SIAM Journal on Computing, vol. 17, no. 2, pp. 373–386, 1988.zbMATHCrossRefMathSciNetGoogle Scholar
  10. [10]
    J.L. Massey, Shift-register synthesis and BCH decoding, IEEE Transactions on Information Theory, vol IT-15, no. 1, pp. 122–127, Jan. 1969.CrossRefMathSciNetGoogle Scholar
  11. [11]
    U.M. Maurer and J.L. Massey, Cascade ciphers: the importance of being first, presented at the 1990 IEEE Int. Symp. on Information Theory, San Diego, CA, Jan. 14–19, 1990 (also submitted to J. of Cryptology).Google Scholar
  12. [12]
    F.J. MacWilliams and N.J. Sloane, The theory of error-correcting codes, Amsterdam: North-Holland, sixth printing, 1988.Google Scholar
  13. [13]
    National Bureau of Standards, DES modes of operation, Fed. Inform. Proc. Standards Publication 81, Nat. Inform. Service, Springfield, VA, Dec. 1980.Google Scholar
  14. [14]
    N. Proctor, A self-synchronizing cascaded cipher system with dynamic control of error propagation, Advances in Cryptology — CRYPTO’ 84, Lecture Notes in Computer Science, vol. 196, Berlin: Springer Verlag, pp. 174–190, 1985.Google Scholar
  15. [15]
    R.A. Rueppel, Analysis and design of stream ciphers, Berlin: Springer Verlag, 1986.zbMATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1991

Authors and Affiliations

  • Ueli M. Maurer
    • 1
  1. 1.Department of Computer SciencePrinceton UniversityPrinceton

Personalised recommendations