{"title":"Oppel-2:一个新的基于fcsr的流密码家族","authors":"Arshad Ali","doi":"10.1109/ICET.2014.7021020","DOIUrl":null,"url":null,"abstract":"This paper presents a new family of secure, small and fast stream ciphers referred to as Oppel-2. Oppel-2 uses Feedback with Carry Shift Registers in combination with an output function to produce pseudorandom keystream. Members of Oppel-2 family of ciphers can also be tailored for different applications to meet their implementation constraints while providing required level of security. The paper defines three instances of Oppel-2, which are referred to as Oppel-2 V0, Oppel-2 V1 and Oppel-2 V2. These instances of Oppel-2 provide security of 264, 280 and 2128 primitive operations, respectively. The paper also shows that Oppel-2 is immune to linearisation attacks, which are considered as most effective attacks against those ciphers whose theory depends upon properties of 2-adic numbers. In addition the paper also presents a security strength analysis of Oppel-2 against various other types of attacks. This analysis shows that Oppel-2 family of ciphers is suitable for implementation in practical applications.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Oppel-2: A new family of FCSR-based stream ciphers\",\"authors\":\"Arshad Ali\",\"doi\":\"10.1109/ICET.2014.7021020\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents a new family of secure, small and fast stream ciphers referred to as Oppel-2. Oppel-2 uses Feedback with Carry Shift Registers in combination with an output function to produce pseudorandom keystream. Members of Oppel-2 family of ciphers can also be tailored for different applications to meet their implementation constraints while providing required level of security. The paper defines three instances of Oppel-2, which are referred to as Oppel-2 V0, Oppel-2 V1 and Oppel-2 V2. These instances of Oppel-2 provide security of 264, 280 and 2128 primitive operations, respectively. The paper also shows that Oppel-2 is immune to linearisation attacks, which are considered as most effective attacks against those ciphers whose theory depends upon properties of 2-adic numbers. In addition the paper also presents a security strength analysis of Oppel-2 against various other types of attacks. This analysis shows that Oppel-2 family of ciphers is suitable for implementation in practical applications.\",\"PeriodicalId\":325890,\"journal\":{\"name\":\"2014 International Conference on Emerging Technologies (ICET)\",\"volume\":\"73 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 International Conference on Emerging Technologies (ICET)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICET.2014.7021020\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Emerging Technologies (ICET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICET.2014.7021020","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Oppel-2: A new family of FCSR-based stream ciphers
This paper presents a new family of secure, small and fast stream ciphers referred to as Oppel-2. Oppel-2 uses Feedback with Carry Shift Registers in combination with an output function to produce pseudorandom keystream. Members of Oppel-2 family of ciphers can also be tailored for different applications to meet their implementation constraints while providing required level of security. The paper defines three instances of Oppel-2, which are referred to as Oppel-2 V0, Oppel-2 V1 and Oppel-2 V2. These instances of Oppel-2 provide security of 264, 280 and 2128 primitive operations, respectively. The paper also shows that Oppel-2 is immune to linearisation attacks, which are considered as most effective attacks against those ciphers whose theory depends upon properties of 2-adic numbers. In addition the paper also presents a security strength analysis of Oppel-2 against various other types of attacks. This analysis shows that Oppel-2 family of ciphers is suitable for implementation in practical applications.