A Framework for Stream Ciphers Based on Pseudorandomness, Randomness and Coding

被引:4
作者
Mihaljevic, Miodrag J. [1 ]
机构
[1] Serbian Acad Arts & Sci, Math Inst, Belgrade, Serbia
来源
ENHANCING CRYPTOGRAPHIC PRIMITIVES WITH TECHNIQUES FROM ERROR CORRECTING CODES | 2009年 / 23卷
关键词
stream ciphers; pseudo-randomness; randomness; homophonic coding; wire-tap channel coding; SECURITY EVALUATION;
D O I
10.3233/978-1-60750-002-5-117
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper yields a generic framework for design of stream ciphers based on a joint employment of pseudo-randomness, randomness and coding, and its two particular settings called SCF-E and SCF-W: The first one is based on a simple homophonic encoding via random bits embedding; The second one employs the wire-tap channel coding. In the both schemes decoding complexities with and without secret key are extremely different providing the origin for the security. The developed frameworks have potential of providing that complexity of recovering secret key in the known plaintext attacking scenario is close to the complexity of recovering the secret key via the exhaustive search. The proposed design approach can be considered as a trade-off between the increased security and decreased communications efficiency which in a number of scenarios appears as a suitable one.
引用
收藏
页码:117 / 139
页数:23
相关论文
共 19 条
[1]  
Aumasson JP, 2007, LECT NOTES COMPUT SC, V4586, P184
[2]  
Biryukov A, 2000, LECT NOTES COMPUT SC, V1976, P1
[3]  
Blum A., 1994, LECT NOTES COMPUTER, V773, p278U
[4]   Modeling bulock decoding approaches for the fast correlation attack [J].
Fossorier, Marc P. C. ;
Mihaljevic, Miodrag J. ;
Imai, Hideki .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2007, 53 (12) :4728-4737
[5]  
Fossorier MPC, 2006, LECT NOTES COMPUT SC, V4329, P48
[6]  
Gilbert H, 2008, LECT NOTES COMPUT SC, V5126, P679, DOI 10.1007/978-3-540-70583-3_55
[7]  
Gilbert H, 2008, LECT NOTES COMPUT SC, V4965, P361
[8]   A CRYPTANALYTIC TIME-MEMORY TRADE-OFF [J].
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1980, 26 (04) :401-406
[9]  
Hopper NJ., 2001, International conference on the theory and application of cryptology and information security, P52, DOI DOI 10.1007/3-540-45682-1
[10]  
JENDAL HN, 1990, LECT NOTES COMPUT SC, V434, P382