Modes of Operation of Stream Ciphers

@inproceedings{Golic2000ModesOO,
  title={Modes of Operation of Stream Ciphers},
  author={J. Golic},
  booktitle={Selected Areas in Cryptography},
  year={2000}
}
  • J. Golic
  • Published in
    Selected Areas in…
    2000
  • Computer Science
A general stream cipher with memory in which each cipher-text symbol depends on both the current and previous plaintext symbols, as well as each plaintext symbol depends on both the current and previous ciphertext symbols, is pointed out. It is shown how to convert any keystream generator into a stream cipher with memory and their security is discussed. It is proposed how to construct secure self-synchronizing stream ciphers, keyed hash functions, hash functions, and block ciphers from any… Expand
Stream Cipher-Based Hash Function and Its Security
TLDR
This paper proposes a model of SCHs which consist of a pre-computation function and a stream cipher and derives the necessary conditions on the stream cipher function for an SCH to be secure. Expand
Analysis of Message Injection in Stream Cipher-Based Hash Functions
TLDR
This paper describes two types of message injection functions, which may be appended to the keystream generator to build an SCH, and evaluates the security of simple SCHs whose stream cipher function consists of a LFSR-based filter generator. Expand
Morpheus: stream cipher for software & hardware applications
TLDR
A word-oriented stream cipher, or Morpheus, for both hardware and software devices, is proposed, which targets multimedia applications, such as Games-On-Demand or IPTV, where data are usually streamed over different kind of networks and devices. Expand
Analysis of Indirect Message Injection for MAC Generation Using Stream Ciphers
TLDR
This paper presents a model for generating a MAC tag with a stream cipher using the input message indirectly, and investigates the security of this model for different options, and identifies cases which permit forgery attacks. Expand
Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive
TLDR
Helix is a high-speed stream cipher with a built-in MAC functionality that with some pre-computation can effectively switch keys on a per-message basis without additional overhead. Expand
Single-Path Authenticated-Encryption Scheme Based on Universal Hashing
TLDR
A single-path authenticated-encryption scheme with provable security based on one of the well-known ∈-almost-universal hash functions, the evaluation hash, which claims that the security of the proposed scheme can be reduced to that of an underlying PRNG in the indistinguishability from random bits. Expand
Hiji-bij-bij: A New Stream Cipher with a Self-synchronizing Mode of Operation
TLDR
It is proved that the mixing achieved by the nonlinear map is complete and the maximum bias in any non-zero linear combination of the input and output bits of the non linear map is at most 2− 13. Expand
New Methods for Digital Generation and Postprocessing of Random Data
  • J. D. Golic
  • Mathematics, Computer Science
  • IEEE Transactions on Computers
  • 2006
TLDR
A new method for digital true random number generation based on asynchronous logic circuits with feedback based on the so-called Galois and Fibonacci ring oscillators is introduced and a concrete technique using a self-clock-controlled linear feedback shift register is proposed. Expand
Simpler methods for generating better Boolean functions with good cryptographic properties
TLDR
The first heuristic optimisation method presented is shown to outperform any other heuristic technique previously reported, in terms of generating highly nonlinear, low autocorrelation balanced boolean functions. Expand
Searching Short Recurrences of Nonlinear Shift Registers via Directed Acyclic Graphs
TLDR
It is shown that existence of a dependence graph with a special property of a nonlinear shift register ensuresexistence of a short recurrence of the sequence generated by the non linear shift register. Expand
...
1
2
...

References

SHOWING 1-10 OF 19 REFERENCES
Hash Functions Based on Block Ciphers: A Synthetic Approach
TLDR
64 possible schemes exist, and it is shown that 12 of these are secure; they can be reduced to 2 classes based on linear transformations of variables and a new attack is presented on a scheme suggested by R. Merkle. Expand
A Fast Cryptographic Checksum Algorithm Based on Stream Ciphers
TLDR
In this scheme, a key stream sequence is used to demultiplex the message into two subsequences, which are then fed into two accumulating feedback shift registers to produce the checksum (also called message authentication code). Expand
Two Practical and Provably Secure Block Ciphers: BEARS and LION
TLDR
Two new provably secure block ciphers are suggested, called BEAR and LION, which both have large block sizes, and are based on the Luby-Rackoff construction. Expand
An Integrity Check Value Algorithm for Stream Ciphers
TLDR
Any legitimate message-icv pair generated by an attacker and injected into the communication channel will have an appropriately small chance of escaping detection unless the attacker has actually broken the stream cipher. Expand
Resynchronization Weaknesses in Synchronous Stream Ciphers
TLDR
A powerful general attack on nonlinearly filtered linear (over Z2) systems is presented and this attack is further refined to efficiently cryptanalyze a linear system with a multiplexer as output function. Expand
Linear Cryptanalysis Method for DES Cipher
TLDR
A new method is introduced for cryptanalysis of DES cipher, which is essentially a known-plaintext attack, that is applicable to an only-ciphertext attack in certain situations. Expand
LFSR-based Hashing and Authentication
TLDR
The characterization of the properties required from a family of hash functions in order to be secure for authentication when combined with a (secure) stream cipher is characterization. Expand
A Known Plaintext Attack on the PKZIP Stream Cipher
TLDR
The PKZIP program is one of the more widely used archive/ compression programs on personal computers, and is used by most BBS's and ftp sites to compress their archives. Expand
Cryptanalysis Based on 2-Adic Rational Approximation
TLDR
A new algorithm for cryptanalytically attacking stream ciphers, based on De Weger and Mahler's rational approximation theory for 2-adic numbers, synthesizes a shortest feedback with carry shift register that outputs a particular key stream, given a small number of bits of the key stream. Expand
Faster Luby-Rackoff Ciphers
TLDR
Based on dedicated hash functions, block ciphers are proposed which are more efficient and operate on larger blocks than their original Luby-Rackoff counterparts. Expand
...
1
2
...