Two Dragons - A Family of Fast Word-based Stream Ciphers

Matt Henricksen

2012

Abstract

The EU eSTREAMcompetition selected two portfolios of stream ciphers, from among thirty-four candidates, with members that were either fast in software or compact in hardware. Dragon was among the eight finalists in the software category. While meeting the performance requirement of being faster than the Advanced Encryption Standard (AES) on many platforms, it was less efficient than the four ciphers selected for the portfolio. Cryptanalysis revealed some less-than-ideal properties. In this paper, we provide some new insights into Dragon, and propose two modifications: Black Dragon, which is tailored for efficient implementation in modern SIMD architectures; and Yellow Dragon, which utilizes recent developments in Chinese block ciphers. We show the improved security and performance of these two variants.

References

  1. Berbain, C., Billet, O., Canteaut, A., Courtois, N., Gilbert, H., Goubin, L., Gouget, A., Granboulan, L., Lauradoux, C., Minier, M., Pornin, T., and Sibert, H. (2008). SOSEMANUK, a Fast Software-Oriented Stream Cipher. In (Robshaw and Billet, 2008), pages 98-118.
  2. Billet, O. and Gilbert, H. (2005). Resistance of SNOW 2.0 against algebraic attacks. In Menezes, A. J., editor, Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005 , volume 3376 of Lecture Notes in Computer Science, pages 19-28. Springer.
  3. Biryukov, A. and Shamir, A. (2000). Cryptanalytic time/memory/data tradeoffs for stream ciphers. In Okamoto, T., editor, Advances in Cryptology - Proceedings of Asiacrypt 2000, volume 1976 of Lecture Notes in Computer Science, pages 1-13. Springer.
  4. Chen, K., Henricksen, M., Millan, W., Fuller, J., Simpson, L. R., Dawson, E., Lee, H., and Moon, S. (2004). Dragon: A fast word based stream cipher. In Park, C. and Chee, S., editors, ICISC, volume 3506 of Lecture Notes in Computer Science, pages 33-50. Springer.
  5. Cho, J. Y. (2008). An improved estimate of the correlation of distinguisher for Dragon. In SASC2008, pages 11- 20, Lausanne, Switzerland. Special Workshop hosted by the ECRYPT Network of Excellence. Proceedings available at http://www.ecrypt.eu.org/stvl/sasc2008/.
  6. Daemen, J. and Rijmen, V. (2002). The Design of Rijndael: AES - The Advanced Encryption Standard. Springer.
  7. Englund, H. and Maximov, A. (2005). Attack the dragon. In Maitra, S., Madhavan, C. E. V., and Venkatesan, R., editors, INDOCRYPT, volume 3797 of Lecture Notes in Computer Science, pages 130-142. Springer.
  8. eSTREAM (2008). Third phase report. http://www.ecrypt.eu.org/stream/index.html.
  9. Feng, X., Liu, J., Zhou, Z., Wu, C., and Feng, D. (2010). A Byte-Based Guess and Determine Attack on SOSEMANUK. In ASIACRYPT'10 , pages 146-157.
  10. Fog, A. (2011). Instruction tables. Lists of instruction latencies, throughputs and microoperation breakdowns for Intel, AMD and VIA CPUs. At www.agner.org/assem/.
  11. People's Republic of China Office of State Commercial Cryptography Administration (2006). The SMS4 Block Cipher. Archive available at http://www.oscca.gov.cn/UpFile/20062101642319799 0.pdf (in Chinese).
  12. Robshaw, M. and Billet, O., editors (2008). New Stream Cipher Designs: The eSTREAM Finalists. Number 4986 in Lecture Notes in Computer Science. Springer.
  13. VAMPIRE - Virtual Applications and Implementations Research Lab (2012). eBACS: ECRYPT Benchmarking of Cryptographic Systems. http://bench.cr.yp.to/results-stream.html.
  14. Wu, H. (2008). The stream cipher HC-128. In (Robshaw and Billet, 2008), pages 39-47.
Download


Paper Citation


in Harvard Style

Henricksen M. (2012). Two Dragons - A Family of Fast Word-based Stream Ciphers . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012) ISBN 978-989-8565-24-2, pages 35-44. DOI: 10.5220/0004014000350044


in Bibtex Style

@conference{secrypt12,
author={Matt Henricksen},
title={Two Dragons - A Family of Fast Word-based Stream Ciphers},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)},
year={2012},
pages={35-44},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004014000350044},
isbn={978-989-8565-24-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)
TI - Two Dragons - A Family of Fast Word-based Stream Ciphers
SN - 978-989-8565-24-2
AU - Henricksen M.
PY - 2012
SP - 35
EP - 44
DO - 10.5220/0004014000350044