期刊文献+

Randomized Stream Ciphers with Enhanced Security Based on Nonlinear Random Coding

Randomized Stream Ciphers with Enhanced Security Based on Nonlinear Random Coding
下载PDF
导出
摘要 We propose a framework for designing randomized stream ciphers with enhanced security. The key attribute of this framework is using of nonlinear bijective mappings or keyless hash functions for random coding. We investigate the computational security of the proposed ciphers against chosen-plaintext-chosen-initialization-vector attacks and show that it is based on the hardness of solving some systems of random nonlinear Boolean equations. We also provide guidelines for choosing components to design randomizers for specified ciphers.
出处 《Journal of Mathematics and System Science》 2015年第12期516-522,共7页 数学和系统科学(英文版)
关键词 Symmetric cryptography randomized stream cipher random coding computational security chosen-plaintext-chosen-initialization-vector attack. 随机编码 非线性 流密码 安全性 安全框架 布尔方程组 密码设计 哈希函数
  • 相关文献

参考文献13

  • 1M.J. Mihaljevic, H. Imai, A stream ciphering approach based on wiretap channel coding, 8th Central European Conference of Cryptography 2008, Graz, Austria, July 2-4, E-Proc. (3 p.), 2008.
  • 2M.J. Mihaljevic, H. Imai, An approach for stream cipher design based on joint computing over random and secret data, Computing, 2009, Vol. 85, N2 1-2, pp. 153-168.
  • 3M.1. Mihaljevic, H. Imai, An information-theoretic and computational complexity security analysis of a randomized stream cipher model, 4th Western European Workshop on Research in Cryptology, WeWoRC 2011, Weimar, Germany, July 20-22, Conf. Record, 2011, pp. 21-25.
  • 4M.J. Mihaljevic, H. Imai, Employment of homophonic coding for improvement of certain encryption approaches based on the LPN problem, Symmetric Key Encryption Workshop, SKEW 2011, Copenhagen, Denmark, Feb. 16-17, E-Proc. (17 p.), 2011.
  • 5M.I. Mihaljevic, F. Oggier, H. Imai, Homophonic coding design for communication systems employing the encoding-encryption paradigm, arXiv: 10 12.5895v 1[cs.CR], 29 Dec, 2010.
  • 6E.R. Berlekamp, R.I. McElice, H. van Tilborg, On the inherent intractability of certain coding problems, IEEE Trans. on Inform. Theory, 1978, Vol. 24, No.3, pp. 384-386.
  • 7AN. Alekseychuk, S.V. Gryshakov, On the computational security of randomized stream ciphers proposed by Mihaljevic and Imai, Zakhist Inform .. 2014, No.4, pp. 328-334.
  • 8AN. Alekseychuk, Analytical estimates of theoretical security of randomized block ciphers against differential cryptanalysis, Zakhist Inform., 2007, No.3, pp. 80-88 (in Russian).
  • 9AN. Alekseychuk, Sufficient conditions for randomized block cipher-systems to be secure against commutative diagram cryptanalysis, Data Recording, Storage and Processing, 2007, Vol. 9, No.2, pp. 61-68, (in Russian).
  • 10ECRYPT II: Final hash function status report, http://www.ecrypt.eu.orgidocuments/D.SYM.ll. 31 Jan., 2013.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部