Abstract
Jump registers have been proposed as building blocks for stream ciphers. In this paper, a construction based on these principles is described. The proposed encryption primitive is a synchronous stream cipher accommodating a key of 128 bits and an IV of 64 up to 162 bits, or an 80-bit key and 32 to 108 bit IV. The stream cipher is particularly designed to resist side-channel attacks and can be efficiently implemented in hardware for a wide range of target processes and platforms.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Jansen, C.J.A.: Modern stream cipher design: A new view on multiple clocking and irreducible polynomials. In: González, S., Martínez, C. (eds.) Actas de la VII Reunión Española sobre Criptología y Seguridad de la Información. Volume Tomo I. Servicio de Publicaciones de la Universidad de Oviedo, pp. 11–29 (2002)
NESSIE: New European Schemes for Signatures, Integrity, and Encryption (2000–2003), https://www.cosic.esat.kuleuven.be/nessie/
Jansen, C.J.A.: Partitions of polynomials: Stream ciphers based on jumping shift registers. In: Cardinal, J., Cerf, N., Delgrange, O., Markowitch, O. (eds.) 26th Symposium on Information Theory in the Benelux, Enschede, Werkgemeenschap voor Informatie- en Communicatietheorie, pp. 277–284 (2005)
Jansen, C.J.A.: Stream cipher constructions over binary extension fields. In: Lagendijk, I., Weber, J.H. (eds.) 27th Symposium on Information Theory in the Benelux, Enschede, Werkgemeenschap voor Informatie- en Communicatietheorie, pp. 213–218 (2006)
Jansen, C.J.A.: Streamcipher design: Make your LFSRs jump! In: The State of the Art of Stream Ciphers, Workshop Record, ECRYPT Network of Excellence in Cryptology, pp. 94–108 (2004), http://www.ecrypt.eu.org/stvl/sasc/sasc-record.zip
Jansen, C.J.A.: Stream cipher design based on jumping finite state machines. Cryptology ePrint Archive, Report 2005/267 (2005), http://eprint.iacr.org/2005/267/ .
Kholosha, A.: Investigations in the Design and Analysis of Key-Stream Generators. PhD thesis, Technische Universiteit Eindhoven (2003), http://alexandria.tue.nl/extra2/200410591.pdf
Kholosha, A.: Clock-controlled shift registers and generalized Geffe key-stream generator. In: Pandu Rangan, C., Ding, C. (eds.) INDOCRYPT 2001. LNCS, vol. 2247, pp. 287–296. Springer, Heidelberg (2001)
Golić, J.D.: Periods of interleaved and nonuniformly decimated sequences. IEEE Trans. Inf. Theory 44(3), 1257–1260 (1998)
Chambers, W.G.: Clock-controlled shift registers in binary sequence generators. IEE Proceedings - Computers and Digital Techniques 135(1), 17–24 (1988)
Lidl, R., Niederreiter, H.: Finite Fields. Encyclopedia of Mathematics and its Applications, vol. 20. Cambridge University Press, Cambridge (1997)
Wong, K.K.H., Colbert, B.D., Batten, L.M., Al-Hinai, S.: Algebraic attacks on clock-controlled cascade ciphers. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol. 4329, pp. 32–47. Springer, Heidelberg (2006)
Khazaei, S.: Cryptanalysis of Pomaranch (CJCSG). eSTREAM, ECRYPT Stream Cipher Project, Report 2005/065 (2005), http://www.ecrypt.eu.org/stream/papersdir/065.pdf
Helleseth, T., Jansen, C.J.A., Khazaei, S., Kholosha, A.: Security of jump controlled sequence generators for stream ciphers. In: Gong, G., Helleseth, T., Song, H.-Y., Yang, K. (eds.) SETA 2006. LNCS, vol. 4086, pp. 141–152. Springer, Heidelberg (2006)
Hell, M., Johansson, T.: On the problem of finding linear approximations and cryptanalysis of Pomaranch version 2. In: Biham, E., Youssef, A.M. (eds.) SAC 2006. LNCS, vol. 4356, pp. 220–233. Springer, Heidelberg (2007)
Englund, H., Hell, M., Johansson, T.: Two general attacks on Pomaranch-like keystream generators. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 274–289. Springer, Heidelberg (2007)
Muller, F.: Differential attacks and stream ciphers. In: The State of the Art of Stream Ciphers, Workshop Record, ECRYPT Network of Excellence in Cryptology, pp. 133–146 (2004), http://www.ecrypt.eu.org/stvl/sasc/sasc-record.zip
Cid, C., Gilbert, H., Johansson, T.: Cryptanalysis of Pomaranch. IEE Proceedings Information Security 153(2), 51–53 (2006)
Hasanzadeh, M.M., Khazaei, S., Kholosha, A.: On IV setup of Pomaranch. In: SASC 2006, Stream Ciphers Revisited, Workshop Record, ECRYPT Network of Excellence in Cryptology, pp. 7–12 (2006), http://www.ecrypt.eu.org/stream/papersdir/082.pdf
Hwang, D., Chaney, M., Karanam, S., Ton, N., Gaj, K.: Comparison of FPGA-targeted hardware implementations of eSTREAM stream cipher candidates. In: SASC 2008, The State of the Art of Stream Ciphers, Workshop Record, ECRYPT Network of Excellence in Cryptology, pp. 151–162 (2008), http://www.ecrypt.eu.org/stvl/sasc2008/SASCRecord.zip
Good, T., Benaissa, M.: Hardware performance of eStream phase-III stream cipher candidates. In: SASC 2008, The State of the Art of Stream Ciphers, Workshop Record, ECRYPT Network of Excellence in Cryptology, pp. 163–173 (2008), http://www.ecrypt.eu.org/stvl/sasc2008/SASCRecord.zip
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Jansen, C.J.A., Helleseth, T., Kholosha, A. (2008). Cascade Jump Controlled Sequence Generator and Pomaranch Stream Cipher. In: Robshaw, M., Billet, O. (eds) New Stream Cipher Designs. Lecture Notes in Computer Science, vol 4986. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-68351-3_17
Download citation
DOI: https://doi.org/10.1007/978-3-540-68351-3_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-68350-6
Online ISBN: 978-3-540-68351-3
eBook Packages: Computer ScienceComputer Science (R0)