Skip to main content

Cascade Jump Controlled Sequence Generator and Pomaranch Stream Cipher

  • Chapter

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4986))

Abstract

Jump registers have been proposed as building blocks for stream ciphers. In this paper, a construction based on these principles is described. The proposed encryption primitive is a synchronous stream cipher accommodating a key of 128 bits and an IV of 64 up to 162 bits, or an 80-bit key and 32 to 108 bit IV. The stream cipher is particularly designed to resist side-channel attacks and can be efficiently implemented in hardware for a wide range of target processes and platforms.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jansen, C.J.A.: Modern stream cipher design: A new view on multiple clocking and irreducible polynomials. In: González, S., Martínez, C. (eds.) Actas de la VII Reunión Española sobre Criptología y Seguridad de la Información. Volume Tomo I. Servicio de Publicaciones de la Universidad de Oviedo, pp. 11–29 (2002)

    Google Scholar 

  2. NESSIE: New European Schemes for Signatures, Integrity, and Encryption (2000–2003), https://www.cosic.esat.kuleuven.be/nessie/

  3. Jansen, C.J.A.: Partitions of polynomials: Stream ciphers based on jumping shift registers. In: Cardinal, J., Cerf, N., Delgrange, O., Markowitch, O. (eds.) 26th Symposium on Information Theory in the Benelux, Enschede, Werkgemeenschap voor Informatie- en Communicatietheorie, pp. 277–284 (2005)

    Google Scholar 

  4. Jansen, C.J.A.: Stream cipher constructions over binary extension fields. In: Lagendijk, I., Weber, J.H. (eds.) 27th Symposium on Information Theory in the Benelux, Enschede, Werkgemeenschap voor Informatie- en Communicatietheorie, pp. 213–218 (2006)

    Google Scholar 

  5. Jansen, C.J.A.: Streamcipher design: Make your LFSRs jump! In: The State of the Art of Stream Ciphers, Workshop Record, ECRYPT Network of Excellence in Cryptology, pp. 94–108 (2004), http://www.ecrypt.eu.org/stvl/sasc/sasc-record.zip

  6. Jansen, C.J.A.: Stream cipher design based on jumping finite state machines. Cryptology ePrint Archive, Report 2005/267 (2005), http://eprint.iacr.org/2005/267/ .

  7. Kholosha, A.: Investigations in the Design and Analysis of Key-Stream Generators. PhD thesis, Technische Universiteit Eindhoven (2003), http://alexandria.tue.nl/extra2/200410591.pdf

  8. Kholosha, A.: Clock-controlled shift registers and generalized Geffe key-stream generator. In: Pandu Rangan, C., Ding, C. (eds.) INDOCRYPT 2001. LNCS, vol. 2247, pp. 287–296. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  9. Golić, J.D.: Periods of interleaved and nonuniformly decimated sequences. IEEE Trans. Inf. Theory 44(3), 1257–1260 (1998)

    Article  Google Scholar 

  10. Chambers, W.G.: Clock-controlled shift registers in binary sequence generators. IEE Proceedings - Computers and Digital Techniques 135(1), 17–24 (1988)

    Google Scholar 

  11. Lidl, R., Niederreiter, H.: Finite Fields. Encyclopedia of Mathematics and its Applications, vol. 20. Cambridge University Press, Cambridge (1997)

    Google Scholar 

  12. Wong, K.K.H., Colbert, B.D., Batten, L.M., Al-Hinai, S.: Algebraic attacks on clock-controlled cascade ciphers. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol. 4329, pp. 32–47. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  13. Khazaei, S.: Cryptanalysis of Pomaranch (CJCSG). eSTREAM, ECRYPT Stream Cipher Project, Report 2005/065 (2005), http://www.ecrypt.eu.org/stream/papersdir/065.pdf

  14. Helleseth, T., Jansen, C.J.A., Khazaei, S., Kholosha, A.: Security of jump controlled sequence generators for stream ciphers. In: Gong, G., Helleseth, T., Song, H.-Y., Yang, K. (eds.) SETA 2006. LNCS, vol. 4086, pp. 141–152. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  15. Hell, M., Johansson, T.: On the problem of finding linear approximations and cryptanalysis of Pomaranch version 2. In: Biham, E., Youssef, A.M. (eds.) SAC 2006. LNCS, vol. 4356, pp. 220–233. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  16. Englund, H., Hell, M., Johansson, T.: Two general attacks on Pomaranch-like keystream generators. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 274–289. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  17. Muller, F.: Differential attacks and stream ciphers. In: The State of the Art of Stream Ciphers, Workshop Record, ECRYPT Network of Excellence in Cryptology, pp. 133–146 (2004), http://www.ecrypt.eu.org/stvl/sasc/sasc-record.zip

  18. Cid, C., Gilbert, H., Johansson, T.: Cryptanalysis of Pomaranch. IEE Proceedings Information Security 153(2), 51–53 (2006)

    Article  Google Scholar 

  19. Hasanzadeh, M.M., Khazaei, S., Kholosha, A.: On IV setup of Pomaranch. In: SASC 2006, Stream Ciphers Revisited, Workshop Record, ECRYPT Network of Excellence in Cryptology, pp. 7–12 (2006), http://www.ecrypt.eu.org/stream/papersdir/082.pdf

  20. Hwang, D., Chaney, M., Karanam, S., Ton, N., Gaj, K.: Comparison of FPGA-targeted hardware implementations of eSTREAM stream cipher candidates. In: SASC 2008, The State of the Art of Stream Ciphers, Workshop Record, ECRYPT Network of Excellence in Cryptology, pp. 151–162 (2008), http://www.ecrypt.eu.org/stvl/sasc2008/SASCRecord.zip

  21. Good, T., Benaissa, M.: Hardware performance of eStream phase-III stream cipher candidates. In: SASC 2008, The State of the Art of Stream Ciphers, Workshop Record, ECRYPT Network of Excellence in Cryptology, pp. 163–173 (2008), http://www.ecrypt.eu.org/stvl/sasc2008/SASCRecord.zip

Download references

Author information

Authors and Affiliations

Authors

Editor information

Matthew Robshaw Olivier Billet

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Jansen, C.J.A., Helleseth, T., Kholosha, A. (2008). Cascade Jump Controlled Sequence Generator and Pomaranch Stream Cipher. In: Robshaw, M., Billet, O. (eds) New Stream Cipher Designs. Lecture Notes in Computer Science, vol 4986. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-68351-3_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-68351-3_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-68350-6

  • Online ISBN: 978-3-540-68351-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics