Loading [MathJax]/extensions/MathZoom.js
Statistical Analysis of the eSTREAM Competition Winners | IEEE Conference Publication | IEEE Xplore

Statistical Analysis of the eSTREAM Competition Winners


Abstract:

eSTREAM is a project that was developed over a period of several years. It had the objective of activating the research area of analysis and design of stream ciphers. At ...Show More

Abstract:

eSTREAM is a project that was developed over a period of several years. It had the objective of activating the research area of analysis and design of stream ciphers. At the end of this project, seven stream ciphers were selected as the winners. These ciphers were subjected to rigorous cryptanalysis and have resulted in the enhancement of overall understanding of stream cipher design. In previous researches, the randomness properties of these ciphers have been tested but not compared. The purpose of this paper is to compare and analyze the randomness properties of the seven winners of eSTREAM project. NIST test suite is applied to the output sequences. The results show that HC-128 and Trivium comparatively outperform the other ciphers in several tests.
Date of Conference: 08-10 December 2015
Date Added to IEEE Xplore: 26 May 2016
ISBN Information:
Conference Location: Kuala Lumpur, Malaysia

I. Introduction

Stream ciphers are considered the most widely used and practical primitives for use in secure communication. They are largely adopted by industry in the area of mobile communications [1]. For instance, a stream cipher named A5/1 is utilized to guarantee the confidentiality of phone conversations in the Global System for Mobile communications (GSM). In addition, a part of the IEEE 802.11 wireless networking standard is a security protocol called Wired Equivalent Privacy (WEP). WEP uses the stream cipher RC4 to ensure confidentiality. Another example is E0 stream cipher that is used by Bluetooth, which is an industry standard for short distance wireless networks [2]. Nevertheless, feasible attacks have been discovered on all three encryption schemes. Hence, there is no standard model for stream ciphers at present, though the same are needed for a lot of applications. To deal with the lack of standards for secure stream ciphers that can be utilised by industry, a number of standardization efforts were made by the cryptographic community towards this end. The first one was the New European Schemes for Signature, Integrity and Encryption (NESSIE) project that began in 2000 and ended in 2004. All the stream cipher proposals sent to NESSIE were discarded mainly because of the discovery of cryptanalytic attacks [3]. After that, Japan initiated another standardization effort named the Cryptographic Research and Evaluation Committee (Cryptrec) [4]. Cryptrec highly recommended a number of stream ciphers, among them: 128-bit RC4, MUGI and MULTI-S01 [5]. But, these ciphers were also subsequently found to be vulnerable to cryptanalytic attacks [6]-[8].

References

References is not available for this document.