Revisiting a Recent Resource-efficient Technique for Increasing the Throughput of Stream Ciphers

Frederik Armknecht, Vasily Mikhalev

2014

Abstract

At CT-RSA 2014, Armknecht and Mikhalev presented a new technique for increasing the throughput of stream ciphers that are based on Feedback Shift Registers (FSRs) which requires practically no additional memory. The authors provided concise sufficient conditions for the applicability of this technique and demonstrated its usefulness on the stream cipher Grain-128. However, as these conditions are quite involved, the authors raised as an open question if and to what extent this technique can be applied to other ciphers as well. In this work, we revisit this technique and examine its applicability to other stream ciphers. On the one hand we show on the example of Grain-128a that the technique can be successfully applied to other ciphers as well. On the other hand we list several stream ciphers where the technique is not applicable for different structural reasons.

References

  1. Agren, M., Hell, M., Johansson, T., and Meier, W. (2011). A new version of Grain-128 with authentication. In Symmetric Key Encryption Workshop.
  2. Armknecht, F. and Mikhalev, V. (2014). On increasing the throughput of stream ciphers. In Topics in Cryptology-CT-RSA.
  3. Babbage, S. and Dodd, M. (2008). The mickey stream ciphers. In (Robshaw and Billet, 2008), pages 191-209.
  4. Berbain, C., Billet, O., Canteaut, A., Courtois, N., Debraize, B., Gilbert, H., Goubin, L., Gouget, A., Granboulan, L., Lauradoux, C., et al. (2005). Decim-a new stream cipher for hardware applications. ECRYPT Stream Cipher Project Report 2005, 4.
  5. Berbain, C., Billet, O., Canteaut, A., Courtois, N., Debraize, B., Gilbert, H., Goubin, L., Gouget, A., Granboulan, L., Lauradoux, C., et al. (2008). Decim v2. In New Stream Cipher Designs, pages 140-151. Springer.
  6. Cannière, C. D. and Preneel, B. (2008). Trivium. In (Robshaw and Billet, 2008), pages 244-266.
  7. Courtois, N. T., ONeil, S., and Quisquater, J.-J. (2009). Practical algebraic attacks on the hitag2 stream cipher. In Information Security, pages 167-176. Springer.
  8. Dinur, I. and Shamir, A. (2011). Breaking grain-128 with dynamic cube attacks. In Fast Software Encryption, pages 167-187. Springer.
  9. Dubrova, E. (2010). Finding matching initial states for equivalent NLFSRs in the Fibonacci and the Galois configurations. Information Theory, IEEE Transactions on, 56(6):2961-2966.
  10. Gammel, B., Göttfert, R., and Kniffler, O. (2007). Achterbahn-128/80: Design and analysis. In ECRYPT Network of Excellence-SASC Workshop Record, pages 152-165.
  11. Good, T. and Benaissa, M. (2008). Hardware performance of eSTREAM phase-III stream cipher candidates. In Proc. of Workshop on the State of the Art of Stream Ciphers (SACS08).
  12. Gouget, A., Sibert, H., Berbain, C., Courtois, N., Debraize, B., and Mitchell, C. (2005). Analysis of the bit-search generator and sequence compression techniques. In Fast Software Encryption, pages 196-214. Springer.
  13. Gupta, S. S., Chattopadhyay, A., Sinha, K., Maitra, S., and Sinha, B. P. (2013). High-performance hardware implementation for RC4 stream cipher. IEEE Transactions on Computers, 62(4):730-743.
  14. Hell, M., Johansson, T., Maximov, A., and Meier, W. (2006). A stream cipher proposal: Grain-128. In Information Theory, 2006 IEEE International Symposium on, pages 1614-1618. IEEE.
  15. Mansouri, S. S. and Dubrova, E. (2010). An improved hardware implementation of the Grain stream cipher. In Digital System Design: Architectures, Methods and Tools (DSD), 2010 13th Euromicro Conference on, pages 433 -440.
  16. Mansouri, S. S. and Dubrova, E. (2013). An improved hardware implementation of the Grain-128a stream cipher. In Kwon, T., Lee, M.-K., and Kwon, D., editors, Information Security and Cryptology ICISC 2012, volume 7839 of Lecture Notes in Computer Science, pages 278-292. Springer Berlin Heidelberg.
  17. Nakano, Y., Fukushima, K., Kiyomoto, S., and Miyake, Y. (2011). Fast implementation of stream cipher K2 on FPGA. In International Conference on Computer and Information Engineering (ICCIE), pages 117-123.
  18. Robshaw, M. J. B. and Billet, O., editors (2008). New Stream Cipher Designs - The eSTREAM Finalists, volume 4986 of Lecture Notes in Computer Science. Springer.
  19. Stefan, D. and Mitchell, C. (2008). On the parallelization of the MICKEY-128 2.0 stream cipher. The State of the Art of Stream Ciphers, SASC, pages 175-185.
  20. Wu, H. and Preneel, B. (2006). Cryptanalysis of the stream cipher decim. In Fast Software Encryption, pages 30- 40. Springer.
  21. Yan, J. and Heys, H. M. (2007). Hardware implementation of the Salsa20 and Phelix stream ciphers. In Electrical and Computer Engineering, 2007. CCECE 2007. Canadian Conference on, pages 1125-1128. IEEE.
  22. Z. Liu, L. Zhang, J. J. and Pan, W. (2010). Efficient pipelined stream cipher ZUC algorithm in FPGA. In The First International Workshop on ZUC Algorithm, December 2-3, Beijing, China,.
Download


Paper Citation


in Harvard Style

Armknecht F. and Mikhalev V. (2014). Revisiting a Recent Resource-efficient Technique for Increasing the Throughput of Stream Ciphers . In Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014) ISBN 978-989-758-045-1, pages 379-386. DOI: 10.5220/0005059803790386


in Bibtex Style

@conference{secrypt14,
author={Frederik Armknecht and Vasily Mikhalev},
title={Revisiting a Recent Resource-efficient Technique for Increasing the Throughput of Stream Ciphers},
booktitle={Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014)},
year={2014},
pages={379-386},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005059803790386},
isbn={978-989-758-045-1},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014)
TI - Revisiting a Recent Resource-efficient Technique for Increasing the Throughput of Stream Ciphers
SN - 978-989-758-045-1
AU - Armknecht F.
AU - Mikhalev V.
PY - 2014
SP - 379
EP - 386
DO - 10.5220/0005059803790386