Skip to main content

Turing: A Fast Stream Cipher

  • Conference paper

Part of the Lecture Notes in Computer Science book series (LNCS,volume 2887)

Abstract

This paper proposes the Turing stream cipher. Turing offers up to 256-bit key strength, and is designed for extremely efficient software implementation.It combines an LFSR generator based on that of SOBER [21] with a keyed mixing function reminiscent of a block cipher round. Aspects of the block mixer round have been derived from Rijndael [6], Twofish [23], tc24 [24] and SAFER++ [17].

Keywords

  • Block Cipher
  • Initialization Vector
  • Stream Cipher
  • Linear Feedback Shift Register
  • Input Word

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. Blackburn, S., Murphy, S., Piper, F., Wild, P.: A SOBERing remark. Unpublished technical report, Information Security Group, Royal Holloway University of London, Egham, Surrey TW20 0EX, U.K (1998)

    Google Scholar 

  2. Bleichenbacher, D., Patel, S.: SOBER cryptanalysis. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 305–316. Springer, Heidelberg (1999)

    CrossRef  Google Scholar 

  3. Bleichenbacher, D., Patel, S., Meier, W.: Analysis of the SOBER stream cipher. TIA Contribution TR45.AHAG/99.08.30.12

    Google Scholar 

  4. Coppersmith, D., Halevi, S., Jutla, C.: Cryptanalysis of Stream Ciphers using Linear Masking. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 515–532. Springer, Heidelberg (2002)

    CrossRef  Google Scholar 

  5. Courtois, N.T.: Higher Order Correlatoin Attacks, XL algorithm and Cryptanalysis of Toyocrypt. Cryptology ePrint Archive, International Association for Cryptological Research (IACR), document 2002/087 (2002), See http://eprint.iacr.org

  6. Daemen, J., Rijmen, V.: AES Proposal: Rijndael (2000), See http://www.esat.kuleuven.ac.be/~rijmen/rijndael

  7. Dawson, E., Clark, A., Gustafson, H., May, L.: CRYPT-X 1998 (Java Version) User Manual. Queensland University of Technology (1999)

    Google Scholar 

  8. Dawson, E., Millan, W., Burnett, L., Carter, G.: On the Design of 8*32 S-boxes. Unpublished report, by the Information Systems Research Centre, Queensland University of Technology (1999)

    Google Scholar 

  9. Ekdahl, P., Johansson, T.: SNOW - a new stream cipher (2000), This paper is found in the NESSIE webpages: http://www.cosic.esat.kuleuven.ac.be/nessie/workshop/submissions/snow.zip

  10. Golic, J.D.: On Security of Nonlinear Filter Generators. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 27–32. Springer, Heidelberg (1996)

    Google Scholar 

  11. Hall, C., Schneier, B.: An Analysis of SOBER (1999) (Unpublished report)

    Google Scholar 

  12. Hawkes, P., Rose, G.: Exploiting multiples of the connection polynomial in word-oriented stream ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 302–316. Springer, Heidelberg (2000)

    CrossRef  Google Scholar 

  13. Hawkes, P., Rose, G.: The t-class of SOBER stream ciphers (2000), See: http://people.qualcomm.com/ggr/QC/tclass.pdf

  14. Hawkes, P., Rose, G.: Primitive specification and supporting documentation for SOBER-t32 submission to NESSIE (2000), See: http://www.cosic.esat.kuleuven.ac.be/nessie/workshop/submissions/sobert32.zip

  15. Herlestam, T.: On functions of Linear Shift Register Sequences. In: Pichler, F. (ed.) EUROCRYPT 1985. LNCS, vol. 219, pp. 119–129. Springer, Heidelberg (1986)

    CrossRef  Google Scholar 

  16. Massey, J.L.: SAFER K-64: A Byte-oriented Block-Ciphering Algorithm. In: Anderson, R. (ed.) FSE 1993. LNCS, vol. 809. Springer, Heidelberg (1994)

    Google Scholar 

  17. Massey, J., Khachatrian, G., Kuregian, M.: Nomination of SAFER++ as Candidate Algorithm for the New European Schemes for Signatures, Integrity, and Encryption (NESSIE) (September 2000), See: http://www.cosic.esat.kuleuven.ac.be/nessie/workshop/submissions/safer++.zip

  18. Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. ch. 6. CRC Press, Boca Raton (1997)

    MATH  Google Scholar 

  19. The NESSIE Project New European Schemes for Signatures, Integrity, and Encryption (2000-2003), See: http://www.cryptonessie.org

  20. Paar, C.: Efficieint VLSI Architectures for Bit-Parallel Computation in Galois Fields. Ph.D. Thesis, Institute for Experimental Mathematics, University of Essen (1994) ISBN 3-18-332810-0

    Google Scholar 

  21. Rose, G.: A stream cipher based on Linear Feedback over GF(28). In: Boyd, C., Dawson, E. (eds.) ACISP 1998. LNCS, vol. 1438, pp. 146–155. Springer, Heidelberg (1998)

    CrossRef  Google Scholar 

  22. Rose, G.: Reference Source Code for Turing. QUALCOMM Australia (2002), See: http://people.qualcomm.com/ggr/QC/Turing.tgz

  23. Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C., Ferguson, N.: Twofish: A 128-Bit Block Cipher. See: http://www.counterpane.com/twofish.html

  24. St, T.: Denis. Weekend Cipher. sci.crypt news article: 3d4d614d_17@news.teranews.com

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rose, G.G., Hawkes, P. (2003). Turing: A Fast Stream Cipher. In: Johansson, T. (eds) Fast Software Encryption. FSE 2003. Lecture Notes in Computer Science, vol 2887. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39887-5_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-39887-5_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20449-7

  • Online ISBN: 978-3-540-39887-5

  • eBook Packages: Springer Book Archive