Advertisement

K2 Stream Cipher

  • Shinsaku Kiyomoto
  • Toshiaki Tanaka
  • Kouichi Sakurai
Part of the Communications in Computer and Information Science book series (CCIS, volume 23)

Abstract

A variety of different clock-controlled stream ciphers and attacks on them have been described in a number of papers. However, few word-oriented algorithms with an irregular clocking mechanism have been proposed. This paper proposes a new design of irregular clocking for word-oriented stream ciphers that is dynamic feedback control and show analysis results of its security and performance. The stream cipher K2 v2.0 is a secure and high-performance stream cipher using the dynamic feedback control, which is applicable for several applications. We believe that the dynamic feedback control mechanism is potentially effective against several different types of attacks, not only existing attacks but also novel attacks.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Al-Hinai, S., Batten, L., Colbert, B., Wong, K.: Algebraic Attacks on Clock-Controlled Stream Ciphers. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 1–16. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  2. 2.
    Babbage, S., Dodd, M.: The stream cipher MICKEY-128 2.0, Article for eSTREAM Project (2006), http://www.ecrypt.eu.org/stream/p2ciphers/mickey128/mickey128_p2.pdf
  3. 3.
    Billet, O., Gilbert, H.: Resistance of SNOW 2.0 Against Algebraic Attacks. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 19–28. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  4. 4.
    Chepyzhov, V., Johansson, T., Smeets, B.: A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 181–195. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  5. 5.
    Coutois, N.: Algebraic Attacks on Combiners with Memory and Several Outputs. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 3–20. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  6. 6.
    Deamen, J., Rijmen, V.: The Design of Rijndael. In: Information Security and Cryptography, Texts and Monographs. Springer, Heidelberg (1998)Google Scholar
  7. 7.
    Ekdahl, P., Johansson, T.: A New Version of the Stream Cipher SNOW. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 47–61. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  8. 8.
    Golic, J.D.: On Security of Nonlinear Filter Generators. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 173–188. Springer, Heidelberg (1996)CrossRefGoogle Scholar
  9. 9.
    Hong, J., Sarkar, P.: Rediscovery of Time Memory Tradeoffs, IACR ePrint Archive, Report 2005/090Google Scholar
  10. 10.
    Jansen, C.J.A., Helleseth, T., Kholosha, A.: Cascade Jump Controlled Sequence Generator and Pomaranch Stream Cipher, Article for eSTREAM Project, http://www.ecrypt.eu.org/stream/p2ciphers/pomaranch/pomaranch_p2.pdf
  11. 11.
    Nyberg, K., Wallen, J.: Improved Linear Distinguishers for SNOW 2.0. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol. 4047, pp. 144–162. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  12. 12.
    Kiyomoto, S., Tanaka, T., Sakurai, K.: A Word-Oriented Stream Cipher Using Clock Control. In: SASC 2007 Workshop Record, pp. 260–274 (2007)Google Scholar
  13. 13.
    Zenner, E.: On the Role of the Inner State Size in Stream Ciphers, Reihe Informatik 01-2004Google Scholar
  14. 14.
    NESSIE, NESSIE Final Report, Parformance of Optimized Implementations of the NESSIE Primitives, NES/DOC/TEC/WP6/D21/2 (2003)Google Scholar
  15. 15.
    NIST, Random Number Generation and Testing, NIST Test Suite, http://csrc.nist.gov/rng/

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Shinsaku Kiyomoto
    • 1
  • Toshiaki Tanaka
    • 1
  • Kouichi Sakurai
    • 2
  1. 1.KDDI R & D Laboratories Inc.SaitamaJapan
  2. 2.Dept. of CSCEKyushu UniversityFukuokaJapan

Personalised recommendations