Oppel-2:一个新的基于fcsr的流密码家族

Arshad Ali
{"title":"Oppel-2:一个新的基于fcsr的流密码家族","authors":"Arshad Ali","doi":"10.1109/ICET.2014.7021020","DOIUrl":null,"url":null,"abstract":"This paper presents a new family of secure, small and fast stream ciphers referred to as Oppel-2. Oppel-2 uses Feedback with Carry Shift Registers in combination with an output function to produce pseudorandom keystream. Members of Oppel-2 family of ciphers can also be tailored for different applications to meet their implementation constraints while providing required level of security. The paper defines three instances of Oppel-2, which are referred to as Oppel-2 V0, Oppel-2 V1 and Oppel-2 V2. These instances of Oppel-2 provide security of 264, 280 and 2128 primitive operations, respectively. The paper also shows that Oppel-2 is immune to linearisation attacks, which are considered as most effective attacks against those ciphers whose theory depends upon properties of 2-adic numbers. In addition the paper also presents a security strength analysis of Oppel-2 against various other types of attacks. This analysis shows that Oppel-2 family of ciphers is suitable for implementation in practical applications.","PeriodicalId":325890,"journal":{"name":"2014 International Conference on Emerging Technologies (ICET)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Oppel-2: A new family of FCSR-based stream ciphers\",\"authors\":\"Arshad Ali\",\"doi\":\"10.1109/ICET.2014.7021020\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents a new family of secure, small and fast stream ciphers referred to as Oppel-2. Oppel-2 uses Feedback with Carry Shift Registers in combination with an output function to produce pseudorandom keystream. Members of Oppel-2 family of ciphers can also be tailored for different applications to meet their implementation constraints while providing required level of security. The paper defines three instances of Oppel-2, which are referred to as Oppel-2 V0, Oppel-2 V1 and Oppel-2 V2. These instances of Oppel-2 provide security of 264, 280 and 2128 primitive operations, respectively. The paper also shows that Oppel-2 is immune to linearisation attacks, which are considered as most effective attacks against those ciphers whose theory depends upon properties of 2-adic numbers. In addition the paper also presents a security strength analysis of Oppel-2 against various other types of attacks. This analysis shows that Oppel-2 family of ciphers is suitable for implementation in practical applications.\",\"PeriodicalId\":325890,\"journal\":{\"name\":\"2014 International Conference on Emerging Technologies (ICET)\",\"volume\":\"73 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 International Conference on Emerging Technologies (ICET)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICET.2014.7021020\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Emerging Technologies (ICET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICET.2014.7021020","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

本文提出了一种新的安全、小巧、快速的流密码,称为Oppel-2。Oppel-2使用带有进位移位寄存器的反馈与输出函数相结合来产生伪随机密钥流。Oppel-2密码家族的成员还可以针对不同的应用程序进行定制,以满足其实现限制,同时提供所需的安全级别。本文定义了Oppel-2的三个实例,分别称为Oppel-2 V0、Oppel-2 V1和Oppel-2 V2。Oppel-2的这些实例分别提供264、280和2128个基本操作的安全性。本文还证明了Oppel-2不受线性化攻击的影响,线性化攻击被认为是针对那些理论依赖于2进数性质的密码的最有效攻击。此外,本文还对Oppel-2在各种攻击下的安全强度进行了分析。分析表明,Oppel-2系列密码适合在实际应用中实现。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Oppel-2: A new family of FCSR-based stream ciphers
This paper presents a new family of secure, small and fast stream ciphers referred to as Oppel-2. Oppel-2 uses Feedback with Carry Shift Registers in combination with an output function to produce pseudorandom keystream. Members of Oppel-2 family of ciphers can also be tailored for different applications to meet their implementation constraints while providing required level of security. The paper defines three instances of Oppel-2, which are referred to as Oppel-2 V0, Oppel-2 V1 and Oppel-2 V2. These instances of Oppel-2 provide security of 264, 280 and 2128 primitive operations, respectively. The paper also shows that Oppel-2 is immune to linearisation attacks, which are considered as most effective attacks against those ciphers whose theory depends upon properties of 2-adic numbers. In addition the paper also presents a security strength analysis of Oppel-2 against various other types of attacks. This analysis shows that Oppel-2 family of ciphers is suitable for implementation in practical applications.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信