Analysis and Design of Stream Ciphers


Book Description

It is now a decade since the appearance of W. Diffie and M. E. Hellmann's startling paper, "New Directions in Cryptography". This paper not only established the new field of public-key cryptography but also awakened scientific interest in secret-key cryptography, a field that had been the almost exclusive domain of secret agencies and mathematical hobbyist. A number of ex cellent books on the science of cryptography have appeared since 1976. In the main, these books thoroughly treat both public-key systems and block ciphers (i. e. secret-key ciphers with no memo ry in the enciphering transformation) but give short shrift to stream ciphers (i. e. , secret-key ciphers wi th memory in the enciphering transformation). Yet, stream ciphers, such as those . implemented by rotor machines, have played a dominant role in past cryptographic practice, and, as far as I can determine, re main still the workhorses of commercial, military and diplomatic secrecy systems. My own research interest in stream ciphers found a natural re sonance in one of my doctoral students at the Swiss Federal Institute of Technology in Zurich, Rainer A. Rueppe1. As Rainer was completing his dissertation in late 1984, the question arose as to where he should publish the many new results on stream ciphers that had sprung from his research.




Stream Ciphers in Modern Real-time IT Systems


Book Description

This book provides the most complete description, analysis, and comparative studies of modern standardized and most common stream symmetric encryption algorithms, as well as stream modes of symmetric block ciphers. Stream ciphers provide an encryption in almost real-time regardless of the volume and stream bit depth of converted data, which makes them the most popular in modern real-time IT systems. In particular, we analyze the criteria and performance indicators of algorithms, as well as the principles and methods of designing stream ciphers. Nonlinear-feedback shift registers, which are one of the main elements of stream ciphers, have been studied in detail. The book is especially useful for scientists, developers, and experts in the field of cryptology and electronic trust services, as well as for the training of graduate students, masters, and bachelors in the field of information security.







New Stream Cipher Designs


Book Description

This state-of-the-art survey presents the outcome of the eSTREAM Project, which was launched in 2004 as part of ECRYPT, the European Network of Excellence in Cryptology (EU Framework VI). The goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be either very fast in software or very resource-efficient in hardware. Algorithm designers were invited to submit new stream cipher proposals to eSTREAM, and 34 candidates were proposed from around the world. Over the following years the submissions were assessed with regard to both security and practicality by the cryptographic community, and the results were presented at major conferences and specialized workshops dedicated to the state of the art of stream ciphers. This volume describes the most successful of the submitted designs and, over 16 chapters, provides full specifications of the ciphers that reached the final phase of the eSTREAM project. The book is rounded off by two implementation surveys covering both the software- and the hardware-oriented finalists.




Design and Cryptanalysis of ZUC


Book Description

This book is a timely document of state-of-the art analytical techniques in the domain of stream cipher design and analysis with a specific cipher, named ZUC. It links new research to brief contextual literature review in the domain of complex LFSR-based stream ciphers. A snapshot of how stream ciphers are deployed in the mobile telephony architecture, one of the most well-known topics for more than five decades in the domain of computer and communication sciences, is presented in this book. The book provides an in-depth study on design and cryptanalysis of ZUC as well as relevant research results in this field with directions towards future analysis of this cipher.







Blockchain Technologies for Sustainable Development in Smart Cities


Book Description

Blockchain technology has great potential to radically change our socio-economic systems by guaranteeing secure transactions between untrusted entities, reducing costs, and simplifying many processes. However, employing blockchain techniques in sustainable applications development for smart cities still has some technical challenges and limitations. Blockchain Technologies for Sustainable Development in Smart Cities investigates blockchain-enabled technology for smart city developments and big data applications. This book provides relevant theoretical frameworks and the latest empirical research findings in the area. Covering topics such as digital finance, smart city technology, and data processing architecture, this book is an essential reference for electricians, policymakers, local governments, city committees, computer scientists, IT professionals, professors and students of higher education, researchers, and academicians.




RC4 Stream Cipher and Its Variants


Book Description

RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With extensive expertise in stream cipher cryptanalysis and RC4 research, the authors focus on the analysis and design issues of RC4. They also explore variants of RC4 and the eSTREAM finalist HC-128.After an introduction to the vast field of







Design and Analysis of RC4-like Stream Ciphers [electronic Resource]


Book Description

RC4 is one of the most widely used ciphers in practical software applications. In this thesis we examine security and design aspects of RC4. First we describe the functioning of RC4 and present previously published analyses. We then present a new cipher, Chameleon which uses a similar internal organization to RC4 but uses different methods. The remainder of the thesis uses ideas from both Chameleon and RC4 to develop design strategies for new ciphers. In particular, we develop a new cipher, RC4B, with the goal of greater security with an algorithm comparable in simplicity to RC4. We also present design strategies for ciphers and two new ciphers for 32-bit processors. Finally we present versions of Chameleon and RC4B that are implemented using playing-cards.