Loading [MathJax]/extensions/MathZoom.js
Statistical Analysis of the eSTREAM Competition Winners | IEEE Conference Publication | IEEE Xplore

Statistical Analysis of the eSTREAM Competition Winners


Abstract:

eSTREAM is a project that was developed over a period of several years. It had the objective of activating the research area of analysis and design of stream ciphers. At ...Show More

Abstract:

eSTREAM is a project that was developed over a period of several years. It had the objective of activating the research area of analysis and design of stream ciphers. At the end of this project, seven stream ciphers were selected as the winners. These ciphers were subjected to rigorous cryptanalysis and have resulted in the enhancement of overall understanding of stream cipher design. In previous researches, the randomness properties of these ciphers have been tested but not compared. The purpose of this paper is to compare and analyze the randomness properties of the seven winners of eSTREAM project. NIST test suite is applied to the output sequences. The results show that HC-128 and Trivium comparatively outperform the other ciphers in several tests.
Date of Conference: 08-10 December 2015
Date Added to IEEE Xplore: 26 May 2016
ISBN Information:
Conference Location: Kuala Lumpur, Malaysia
References is not available for this document.

I. Introduction

Stream ciphers are considered the most widely used and practical primitives for use in secure communication. They are largely adopted by industry in the area of mobile communications [1]. For instance, a stream cipher named A5/1 is utilized to guarantee the confidentiality of phone conversations in the Global System for Mobile communications (GSM). In addition, a part of the IEEE 802.11 wireless networking standard is a security protocol called Wired Equivalent Privacy (WEP). WEP uses the stream cipher RC4 to ensure confidentiality. Another example is E0 stream cipher that is used by Bluetooth, which is an industry standard for short distance wireless networks [2]. Nevertheless, feasible attacks have been discovered on all three encryption schemes. Hence, there is no standard model for stream ciphers at present, though the same are needed for a lot of applications. To deal with the lack of standards for secure stream ciphers that can be utilised by industry, a number of standardization efforts were made by the cryptographic community towards this end. The first one was the New European Schemes for Signature, Integrity and Encryption (NESSIE) project that began in 2000 and ended in 2004. All the stream cipher proposals sent to NESSIE were discarded mainly because of the discovery of cryptanalytic attacks [3]. After that, Japan initiated another standardization effort named the Cryptographic Research and Evaluation Committee (Cryptrec) [4]. Cryptrec highly recommended a number of stream ciphers, among them: 128-bit RC4, MUGI and MULTI-S01 [5]. But, these ciphers were also subsequently found to be vulnerable to cryptanalytic attacks [6]-[8].

Select All
1.
X. X. Fan, T. Wu and G. Gong, "An efficient stream cipher WG-16 and its application for securing 4G-LTE networks", Applied Mechanics and Materials, vol. 490, pp. 1436-1450, 2014.
2.
A. Klein, Stream ciphers, Springer, 2013.
3.
J. Lano, "Cryptanalysis and design of synchronous stream ciphers", June 2006.
4.
H. Imai and A. Yamagishi, "CRYPTREC Project Cryptographic Evaluation Project for the Japanese Electronic Government" in Advances in Cryptology—ASIACRYPT 2000, Springer, pp. 399-400, 2000.
5.
J. Y. Cho, New Results on Cryptanalysis of Stream Ciphers, Macquarie University, 2007.
6.
J. D. Golić, "A weakness of the linear part of stream cipher MUGI", Fast Software Encryption, pp. 178-192, 2004.
7.
M. Henricksen and E. Dawson, "Rekeying issues in the MUGI stream cipher", Selected Areas in Cryptography, pp. 175-188, 2006.
8.
A. Nagao, T. Ohigashi, T. Isobe and M. Morii, "Expanding Weak-key Space of RC 4", Journal of Information Processing, vol. 22, pp. 357-365, 2014.
9.
M. Robshaw and O. Billet, New stream cipher designs: the eSTREAM finalists, Springer, vol. 4986, 2008.
10.
H. Wu, "The stream cipher HC-128" in New Stream Cipher Designs, Springer, pp. 39-47, 2008.
11.
D. J. Bernstein, "The Salsa20 family of stream ciphers" in New stream cipher designs, Springer, pp. 84-97, 2008.
12.
M. Boesgaard, M. Vesterager and E. Zenner, "The Rabbit stream cipher" in New Stream Cipher Designs, Springer, pp. 69-83, 2008.
13.
C. Berbain, O. Billet, A. Canteaut, N. Courtois, H. Gilbert, L. Goubin et al., "Sosemanuk a fast software-oriented stream cipher" in New Stream Cipher Designs, Springer, pp. 98-118, 2008.
14.
M. Hell, T. Johansson and W. Meier, "Grain: a stream cipher for constrained environments", International Journal of Wireless and Mobile Computing, vol. 2, pp. 86-93, 2007.
15.
S. Babbage and M. Dodd, "The stream cipher MICKEY 2.0", ECRYPT Stream Cipher, 2006.
16.
C. De Cannière, "Trivium: A stream cipher construction inspired by block cipher design principles" in Information Security, Springer, pp. 171-186, 2006.
17.
A. Rukhin, J. Soto, J. Nechvatal, E. Barker, S. Leigh, M. Levenson et al., "Statistical test suite for random and pseudorandom number generators for cryptographic applications NIST special publication", 2010.
18.
M. S. Turen, A. Doganaksoy and C. Calik, "Detailed Statistical Analysis of Synchronous Stream Ciphers", SASC 2006: Stream Cipher Revisited, 2006.
19.
S. Babbage and M. Dodd, "The stream cipher MICKEY-128", ECRYPT Stream Cipher Project Report, vol. 16, 2005.
20.
F. M. Ali Eljadi and I. F. Taha Al-Shaikhli, "Dynamic linear feedback shift registers: A review", Information and Communication Technology for The Muslim World (ICT4M) 2014 The 5th International Conference on, pp. 1-5, 2014.
21.
P. FIPS, "140-2: Security requirements for cryptographic modules", National Institute of Standards and Technology, 2001.
22.
G. Marsaglia, "DIEHARD statistical tests", Florida state university, 1995.
23.
T. E. Schilling and H. Raddum, "Analysis of trivium using compressed right hand side equations" in Information Security and Cryptology-ICISC 2011, Springer, pp. 18-32, 2012.

References

References is not available for this document.