On Lightweight Stream Ciphers with Shorter Internal States

被引:63
作者
Armknecht, Frederik [1 ]
Mikhalev, Vasily [1 ]
机构
[1] Univ Mannheim, D-68131 Mannheim, Germany
来源
FAST SOFTWARE ENCRYPTION, FSE 2015 | 2015年 / 9054卷
关键词
Stream ciphers; Lightweight cryptography; Time-memory-data-tradeoff attacks; ATTACKS; FAMILY;
D O I
10.1007/978-3-662-48116-5_22
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To be resistant against certain time-memory-data-tradeoff (TMDTO) attacks, a common rule of thumb says that the internal state size of a stream cipher should be at least twice the security parameter. As memory gates are usually the most area and power consuming components, this implies a sever limitation with respect to possible lightweight implementations. In this work, we revisit this rule. We argue that a simple shift in the established design paradigm, namely to involve the fixed secret key not only in the initialization process but in the keystream generation phase as well, enables stream ciphers with smaller area size for two reasons. First, it improves the resistance against the mentioned TMDTO attacks which allows to choose smaller state sizes. Second, one can make use of the fact that storing a fixed value (here: the key) requires less area size than realizing a register of the same length. We demonstrate the feasibility of this approach by describing and implementing a concrete stream cipher Sprout which uses significantly less area than comparable existing lightweight stream ciphers.
引用
收藏
页码:451 / 470
页数:20
相关论文
共 36 条
[1]  
Abdelraheem Mohamed Ahmed, 2011, Cryptography and Coding. 13th IMA International Conference, IMACC 2011. Proceedings, P375, DOI 10.1007/978-3-642-25516-8_23
[2]  
Afzal M., 2008, INFORM COMMUNICATION, P1
[3]   Grain-128a: A new version of Grain-128 with optional authentication [J].
Ågren M. ;
Hell M. ;
Johansson T. ;
Meier W. .
International Journal of Wireless and Mobile Computing, 2011, 5 (01) :48-59
[4]  
[Anonymous], ECRYPT WORKSH SASC S
[5]  
Armknecht F., 2014, WORKSH RFID SEC RFID
[6]  
Babbage S., 2006, The Stream Cipher MICKEY 2.0
[7]  
Babbage S. H., 1995, P EUR CONV SEC DET, P161, DOI DOI 10.1049/CP:19950490
[8]  
Babbage S, 2008, LECT NOTES COMPUT SC, V4986, P191
[9]  
Banik Subhadeep, 2012, Security, Privacy, and Applied Cryptography Engineering. Proceedings Second International Conference, SPACE 2012, P111, DOI 10.1007/978-3-642-34416-9_8
[10]  
Banik S, 2012, LECT NOTES COMPUT SC, V7428, P122, DOI 10.1007/978-3-642-33027-8_8