# Modes of Operation of Stream Ciphers

@inproceedings{Golic2000ModesOO, title={Modes of Operation of Stream Ciphers}, author={J. Golic}, booktitle={Selected Areas in Cryptography}, year={2000} }

A general stream cipher with memory in which each cipher-text symbol depends on both the current and previous plaintext symbols, as well as each plaintext symbol depends on both the current and previous ciphertext symbols, is pointed out. It is shown how to convert any keystream generator into a stream cipher with memory and their security is discussed. It is proposed how to construct secure self-synchronizing stream ciphers, keyed hash functions, hash functions, and block ciphers from any… Expand

#### Topics from this paper

#### 11 Citations

Stream Cipher-Based Hash Function and Its Security

- Computer Science
- ICETE
- 2010

This paper proposes a model of SCHs which consist of a pre-computation function and a stream cipher and derives the necessary conditions on the stream cipher function for an SCH to be secure. Expand

Analysis of Message Injection in Stream Cipher-Based Hash Functions

- Computer Science
- ACNS
- 2011

This paper describes two types of message injection functions, which may be appended to the keystream generator to build an SCH, and evaluates the security of simple SCHs whose stream cipher function consists of a LFSR-based filter generator. Expand

Morpheus: stream cipher for software & hardware applications

- Computer Science
- 2007

A word-oriented stream cipher, or Morpheus, for both hardware and software devices, is proposed, which targets multimedia applications, such as Games-On-Demand or IPTV, where data are usually streamed over different kind of networks and devices. Expand

Analysis of Indirect Message Injection for MAC Generation Using Stream Ciphers

- Computer Science
- ACISP
- 2012

This paper presents a model for generating a MAC tag with a stream cipher using the input message indirectly, and investigates the security of this model for different options, and identifies cases which permit forgery attacks. Expand

Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive

- Computer Science
- FSE
- 2003

Helix is a high-speed stream cipher with a built-in MAC functionality that with some pre-computation can effectively switch keys on a per-message basis without additional overhead. Expand

Single-Path Authenticated-Encryption Scheme Based on Universal Hashing

- Mathematics, Computer Science
- Selected Areas in Cryptography
- 2002

A single-path authenticated-encryption scheme with provable security based on one of the well-known ∈-almost-universal hash functions, the evaluation hash, which claims that the security of the proposed scheme can be reduced to that of an underlying PRNG in the indistinguishability from random bits. Expand

Hiji-bij-bij: A New Stream Cipher with a Self-synchronizing Mode of Operation

- Computer Science
- INDOCRYPT
- 2003

It is proved that the mixing achieved by the nonlinear map is complete and the maximum bias in any non-zero linear combination of the input and output bits of the non linear map is at most 2− 13. Expand

New Methods for Digital Generation and Postprocessing of Random Data

- Mathematics, Computer Science
- IEEE Transactions on Computers
- 2006

A new method for digital true random number generation based on asynchronous logic circuits with feedback based on the so-called Galois and Fibonacci ring oscillators is introduced and a concrete technique using a self-clock-controlled linear feedback shift register is proposed. Expand

Simpler methods for generating better Boolean functions with good cryptographic properties

- Mathematics, Computer Science
- Australas. J Comb.
- 2004

The first heuristic optimisation method presented is shown to outperform any other heuristic technique previously reported, in terms of generating highly nonlinear, low autocorrelation balanced boolean functions. Expand

Searching Short Recurrences of Nonlinear Shift Registers via Directed Acyclic Graphs

- Computer Science
- Inscrypt
- 2011

It is shown that existence of a dependence graph with a special property of a nonlinear shift register ensuresexistence of a short recurrence of the sequence generated by the non linear shift register. Expand

#### References

SHOWING 1-10 OF 19 REFERENCES

Hash Functions Based on Block Ciphers: A Synthetic Approach

- Mathematics, Computer Science
- CRYPTO
- 1993

64 possible schemes exist, and it is shown that 12 of these are secure; they can be reduced to 2 classes based on linear transformations of variables and a new attack is presented on a scheme suggested by R. Merkle. Expand

A Fast Cryptographic Checksum Algorithm Based on Stream Ciphers

- Computer Science
- AUSCRYPT
- 1992

In this scheme, a key stream sequence is used to demultiplex the message into two subsequences, which are then fed into two accumulating feedback shift registers to produce the checksum (also called message authentication code). Expand

Two Practical and Provably Secure Block Ciphers: BEARS and LION

- Computer Science
- FSE
- 1996

Two new provably secure block ciphers are suggested, called BEAR and LION, which both have large block sizes, and are based on the Luby-Rackoff construction. Expand

An Integrity Check Value Algorithm for Stream Ciphers

- Computer Science
- CRYPTO
- 1993

Any legitimate message-icv pair generated by an attacker and injected into the communication channel will have an appropriately small chance of escaping detection unless the attacker has actually broken the stream cipher. Expand

Resynchronization Weaknesses in Synchronous Stream Ciphers

- Computer Science
- EUROCRYPT
- 1993

A powerful general attack on nonlinearly filtered linear (over Z2) systems is presented and this attack is further refined to efficiently cryptanalyze a linear system with a multiplexer as output function. Expand

Linear Cryptanalysis Method for DES Cipher

- Computer Science
- EUROCRYPT
- 1993

A new method is introduced for cryptanalysis of DES cipher, which is essentially a known-plaintext attack, that is applicable to an only-ciphertext attack in certain situations. Expand

LFSR-based Hashing and Authentication

- Computer Science
- CRYPTO
- 1994

The characterization of the properties required from a family of hash functions in order to be secure for authentication when combined with a (secure) stream cipher is characterization. Expand

A Known Plaintext Attack on the PKZIP Stream Cipher

- Computer Science
- FSE
- 1994

The PKZIP program is one of the more widely used archive/ compression programs on personal computers, and is used by most BBS's and ftp sites to compress their archives. Expand

Cryptanalysis Based on 2-Adic Rational Approximation

- Mathematics, Computer Science
- CRYPTO
- 1995

A new algorithm for cryptanalytically attacking stream ciphers, based on De Weger and Mahler's rational approximation theory for 2-adic numbers, synthesizes a shortest feedback with carry shift register that outputs a particular key stream, given a small number of bits of the key stream. Expand

Faster Luby-Rackoff Ciphers

- Computer Science
- FSE
- 1996

Based on dedicated hash functions, block ciphers are proposed which are more efficient and operate on larger blocks than their original Luby-Rackoff counterparts. Expand