K2: A STREAM CIPHER ALGORITHM USING DYNAMIC FEEDBACK CONTROL

Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai

Abstract

A variety of different clock-controlled stream ciphers and attacks on them have been described in a number of papers. However, few word-oriented algorithms with an irregular clocking mechanism have been proposed. This paper proposes a new design of irregular clocking for word-oriented stream ciphers that is dynamic feedback control and show analysis results of its security and performance. The stream cipher K2 v2.0 is a secure and high-performance stream cipher using the dynamic feedback control, which is applicable for several applications. We believe that the dynamic feedback control mechanism is potentially effective against several different types of attacks, not only existing attacks but also novel attacks.

References

  1. Al-Hinai, S., Batten, L., Colbert, B., and Wong, K. (2006). Algebraic attacks on clock-controlled stream ciphers.
  2. 3eSTREAM Project, http://www.ecrypt.eu.org/stream/ Billet, O. and Gilbert, H. (2005). Resistance of SNOW 2.0 against algebraic attacks. In Proc. of CT-RSA 2005, LNCS, volume 3376, pages 19-28. Springer Verlag.
  3. Chepyzhov, V., Johansson, T., and Smeets, B. (2001). A simple algorithm for fast correlation attacks on stream ciphers. In Proc. of FSE'00, LNCS, volume 1978, pages 181-195. Springer Verlag.
  4. Courtois, N. (2005). Algebraic attacks on combiners with memory and several outputs. In Proc. of ICISC 2004, LNCS, volume 3506, pages 3-20. Springer Verlag.
  5. Daemen, J. and Rijmen, V. (1998). The Design of Rijndael, Information Security and Cryptography, Texts and Monographs. Springer Verlag.
  6. Ekdahl, P. and Johansson, T. (2000). Snow -a new stream cipher. The NESSIE submission paper.
  7. Ekdahl, P. and Johansson, T. (2003). A new version of the stream cipher SNOW. In Proc. of SAC 2002, LNCS, volume 2595, pages 47-61. Springer Verlag.
  8. Golic, J. D. (1996). On security of nonlinear filter generators. In Proc. of FSE 7896, LNCS, volume 1039, pages 173-188. Springer Verlag.
  9. Hong, J. and Sarkar, P. (2005). Rediscovery of time memory tradeoffs. IACR ePrint Archive, Report 2005/090.
  10. Jansen, C. J., Helleseth, T., and Kholosha, A. (2005). Cascade jump controlled sequence generator and POMARANCH stream cipher. Article for eSTREAM Project, available at http://www.ecrypt. eu.org/stream/p2ciphers/pomaranch/ pomaranch\_p2.pdf.
  11. Kiyomoto, S., Tanaka, T., and Sakurai, K. (2007). A word-oriented stream cipher using clock control. In SASC 2007 Workshop Record, pages 260-274, available at http://sasc.crypto.rub.de/files/ sasc2007_record.zip.
  12. Nyberg, K. and Wallen, J. (2006). Improved linear distinguishers for SNOW 2.0. In Proc. of FSE 2006, LNCS, volume 4047, pages 144-162. Springer Verlag.
  13. Rose, G. and Hawkes, P. (1999). The t-class of sober stream cipher. Publication Document, QUALCOMM Australia.
  14. Simpson, L., Dawson, E., Golic, J., and Millan, W. (2000). LILI keystream generator. In Proc. of SAC 2000, LNCS, volume 2012, pages 248-261. Springer Verlag.
  15. Zenner, E. (2003). On the efficiency of the clock control guessing attack. In Proc. of ICISC'02, LNCS, volume 2587, pages 200-212. Springer Verlag.
  16. Zenner, E. (2004). On the role of the inner state size in stream ciphers. Reihe Informatik 01-2004.
Download


Paper Citation


in Harvard Style

Kiyomoto S., Tanaka T. and Sakurai K. (2007). K2: A STREAM CIPHER ALGORITHM USING DYNAMIC FEEDBACK CONTROL . In Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007) ISBN 978-989-8111-12-8, pages 204-213. DOI: 10.5220/0002122302040213


in Bibtex Style

@conference{secrypt07,
author={Shinsaku Kiyomoto and Toshiaki Tanaka and Kouichi Sakurai},
title={K2: A STREAM CIPHER ALGORITHM USING DYNAMIC FEEDBACK CONTROL},
booktitle={Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)},
year={2007},
pages={204-213},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002122302040213},
isbn={978-989-8111-12-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)
TI - K2: A STREAM CIPHER ALGORITHM USING DYNAMIC FEEDBACK CONTROL
SN - 978-989-8111-12-8
AU - Kiyomoto S.
AU - Tanaka T.
AU - Sakurai K.
PY - 2007
SP - 204
EP - 213
DO - 10.5220/0002122302040213