Abstract
In 21st Century, Data Security is achieved through Cryptographically secure Pseudo Random Number Generators (CSPRNG). Hence, all stream ciphers uses CSPRNG. Mostly all the Hardware ciphers are developed using Linear Feedback Shift Register (LFSR). Owing to linear nature of LFSR, cipher becomes predictable and hence easily vulnerable to various LFSR based attacks. Secondly, security enhancements cannot be deployed on it because of its hardcore implementation. Therefore, our focus is to implement the various ciphers on multicore architecture without compromising throughput of the cipher. For this, we come up with rigorous literature survey of various stream ciphers like ZUC 1.6, SNOW 3G, GRAIN v1, WG-7, and DECIM v1, and also measure the randomness of above ciphers using NIST Statistical Toolkit.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Darshana Upadhyay, Trishla Shah, and Priyanka Sharma, Cryptanalysis of hardware based stream ciphers and implementation of GSM stream cipher to propose a novel approach for designing n-bit LFSR stream cipher, VLSI Design and Test (VDAT) (2015), pp. 1–6.
Darshana Upadhyay, Priyanka Sharma, and Srinivas Sampalli, Enhancement of GSM stream Cipher security using variable taps mechanism and nonlinear combination functions on Linear feedback shift registers., International conference on ICT for Intelligence Systems (ICTIS) (2015).
Paris Kitsos, Nicolas Sklavos, George Provelengios, and Athanassios N Skodras, FPGA-based performance analysis of stream ciphers ZUC, Snow3g, Grain V1, Mickey V2, Trivium and E0, Microprocessors and Microsystems 37 (2013), no. 2, 235–245.
Yiyuan Luo, Qi Chai, Guang Gong, and Xuejia Lai, A lightweight stream cipher WG-7 for RFID encryption and authentication, Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE, IEEE, 2010, pp. 1–6.
Martin Hell, Thomas Johansson, and Willi Meier, Grain: a stream cipher for constrained environments, International Journal of Wireless and Mobile Computing 2 (2007), no. 1, 86–93.
Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas Courtois, Blandine Debraize, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, et al., Decim v2, New Stream Cipher Designs, Springer, 2008, pp. 140–151.
David Hwang, Mark Chaney, Shashi Karanam, Nick Ton, and Kris Gaj, Comparison of FPGA-targeted hardware implementations of eSTREAM stream cipher candidates, The State of the Art of Stream Ciphers (2008), pp. 151–162.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Upadhya, D., Gandhi, S. (2017). Randomness Evaluation of ZUC, SNOW and GRAIN Stream Ciphers. In: Modi, N., Verma, P., Trivedi, B. (eds) Proceedings of International Conference on Communication and Networks. Advances in Intelligent Systems and Computing, vol 508. Springer, Singapore. https://doi.org/10.1007/978-981-10-2750-5_6
Download citation
DOI: https://doi.org/10.1007/978-981-10-2750-5_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-2749-9
Online ISBN: 978-981-10-2750-5
eBook Packages: EngineeringEngineering (R0)