keys generated by a stream cipher scheme. Key gen-
eration and encryption follows a chained approach in
which current (block) keys and ICTs are used to gen-
erate (block) keys for the encryption of subsequent
message blocks. This approach is feasible for en-
crypting a message using a hybrid stream cipher and
block cipher approach. The novelty of our approach
is its dynamic key generation from an intermediate ci-
pher text with an the integration of an integrity check.
We are currently extending our research to optimize
the computational efficiency of our approach.
REFERENCES
(2014). The cryptool portal @ONLINE. http://www. cryp-
tool.org/en.
Bardis, N., Markovskyy, A., and Andrikou, D. (2004).
Method for designing pseudorandom binary se-
quences generators on nonlinear feedback shift reg-
ister(nfsr). WSEAS Transactions on Communications,
3(2):758–763.
Biebighauser, D. (2000). Testing random num-
ber generators @ONLINE. http://www-users.
math.umn.edu/vgarrett/students/reu/pRNGs.pdf.
De Canni
`
ere, C. (2006). Trivium: A stream cipher con-
struction inspired by block cipher design principles.
In Information Security, pages 171–186. Springer.
Dubrova, E., Teslenko, M., and Tenhunen, H. (2008). On
analysis and synthesis of (n, k)-non-linear feedback
shift registers. In Design, Automation and Test in Eu-
rope, 2008. DATE’08, pages 1286–1291. IEEE.
Engels, D., Fan, X., Gong, G., Hu, H., and Smith, E. M.
(2010). Hummingbird: ultra-lightweight cryptog-
raphy for resource-constrained devices. In Finan-
cial Cryptography and Data Security, pages 3–18.
Springer.
Hell, M., Johansson, T., and Brynielsson, L. (2009). An
overview of distinguishing attacks on stream ciphers.
Cryptography and Communications, 1(1):71–94.
Hu, H. and Gong, G. (2011). Periods on two kinds of non-
linear feedback shift registers with time varying feed-
back functions. International Journal of Foundations
of Computer Science, 22(06):1317–1329.
Hu, M. and Wang, Y. (2009). The collision rate tests of two
known message digest algorithms. In Computational
Intelligence and Security, 2009. CIS’09. International
Conference on, volume 2, pages 319–323. IEEE.
Jeddi, Z., Amini, E., and Bayoumi, M. (2013). A novel au-
thenticated encryption algorithm for rfid systems. In
Digital System Design (DSD), 2013 Euromicro Con-
ference on, pages 658–661. IEEE.
Jinabade, K. and Rasane, K. (2013). Efficient implemen-
tation of hummingbird cryptographic algorithm on
a reconfigurable platform. In International Journal
of Engineering Research and Technology, volume 2.
ESRSA Publications.
Knudsen, L. R. (1994). Practically secure feistel ciphers. In
Fast Software Encryption, pages 211–221. Springer.
Kumar, Y., Munjal, R., and Sharma, H. (2011). Compari-
son of symmetric and asymmetric cryptography with
existing vulnerabilities and countermeasures. Interna-
tional Journal of Computer Science and Management
Studies, 11(03).
Li, X., Zhang, W., Wang, X., and Li, M. (2012). Novel con-
vertible authenticated encryption schemes without us-
ing hash functions. In Computer Science and Automa-
tion Engineering (CSAE), 2012 IEEE International
Conference on, volume 1, pages 504–508. IEEE.
Lv, H., Xie, J.-X., Fang, J.-C., and Qi, P. (2012). Generating
of a nonlinear pseudorandom sequence using linear
feedback shift register. In ICT Convergence (ICTC),
2012 International Conference on, pages 432–435.
IEEE.
Mandal, K. and Gong, G. (2012). Probabilistic generation
of good span n sequences from nonlinear feedback
shift registers. University of Waterloo.
Northwood, C. Cryptography, attacks and countermeasures
@ONLINE. http://www.pling.org.uk/cs/cry.html.
Rachwalik, T., Szmidt, J., Wicik, R., and Zablocki, J.
(2012). Generation of nonlinear feedback shift reg-
isters with special-purpose hardware. In Communi-
cations and Information Systems Conference (MCC),
2012 Military, pages 1–4. IEEE.
Soto, J. Statistical testing of random number gen-
erators @ONLINE. http://infosec.pku.edu.cn/
vtly/oldversion/nist-nissc-1999/papers/p24.pdf.
Wang, Y., Manulis, M., Au, M. H., and Susilo, W. (2013).
Relations among privacy notions for signcryption and
key invisible sign-then-encrypt. In Information Secu-
rity and Privacy, pages 187–202. Springer.
Wu, Y., Noonan, J. P., and Agaian, S. (2011). A novel infor-
mation entropy based randomness test for image en-
cryption. In Systems, Man, and Cybernetics (SMC),
2011 IEEE International Conference on, pages 2676–
2680. IEEE.
Zeng, K., Yang, C.-H., Wei, D.-Y., and Rao, T. (1991).
Pseudorandom bit generators in stream-cipher cryp-
tography. Computer, 24(2):8–17.
Zheng, Y. (1997). Digital signcryption or how to
achieve cost (signature & encryption) łcost (signa-
ture) + cost(encryption). In Advances in Cryptology-
CRYPTO’97, pages 165–179. Springer.
Zulkifli, M. Z. W. M. (2008). Attack on crypto-
graphy @ONLINE. https://idazuwaika.files.word
press.com/2008/06/attack-on-cryptography.pdf.
HIDE:HybridSymmetricKeyAlgorithmforIntegrityCheck,DynamicKeyGenerationandEncryption
131