[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

CAR30: A new scalable stream cipher with rule 30

Published: 01 June 2013 Publication History

Abstract

CAR30 is a new stream cipher that uses classical Rule 30 of Cellular Automata (CA) along with a Maximum Length Linear Hybrid CA. This design can be implemented efficiently both in hardware and software. It has a fast initialization algorithm that makes it suitable for small messages. The generic design of the cipher enables to scale up for any length of Key and IV. This paper describes the cipher with 128-bit Key and 120-bit IV and evaluates the security and implementation aspects of it. The main advantages of the proposed cipher are the flexibility of its design, good hardware throughput in comparison with state-of-the-art hardware oriented ciphers like Grain and Trivium and better software speed than the software oriented stream cipher Rabbit.

References

[1]
Badel, S., et al.: ARMADILLO: a multi-purpose cryptographic primitive dedicated to hardware. In: Proceedings of Workshop on Cryptographic Hardware and Embedded Systems 2010 (CHES 2010). LNCS, vol. 6225, pp. 398-412. Springer (2010).
[2]
Biryukov, A., Shamir, A.: Cryptanalytic time/memory/data tradeoffs for stream ciphers. In: Proceedings of ASIACRYPT 2000. LNCS, vol. 1976, pp. 1-13. Springer-Verlag (2000).
[3]
Bjøstad, T.E.: Cryptanalysis of Grain using Time/Memory/Data Tradeoffs. http://www.ecrypt. eu.org/stream/papersdir/2008/012.pdf. Accessed 29 Jan 2013.
[4]
Boesgaard, M., Vesterager, M., Pedersen, T., Christiansen, J., Scavenius, O.: Rabbit: a high-performance stream cipher. In: Proc. FSE 2003. LNCS, vol. 2887, pp. 307-329. Springer (2003).
[5]
De Canniere, C., Preneel, B.: Trivium Specification. http://www.ecrypt.eu.org/stream/triviump3.html. Accessed 29 Jan 2013.
[6]
De Canniere, C., Kücük, O., Preneel, B.: Analysis of Grain's Initialization Algorithm. Presented in SAC2008. http://www.ecrypt.eu.org/stvl/sasc2008/. Accessed 29 Jan 2013.
[7]
Carlet, C.: On highly nonlinear S-boxes and their inability to thwart DPA attacks. Indocrypt 2005. LNCS, vol. 3797, pp. 49-62 (2005).
[8]
Courtois, N., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Biham, E. (ed.) Advances in Cryptology-EUROCRYPT 2003, LNCS, vol. 2656, pp. 345-359. Springer-Verlag (2003).
[9]
Diffie, W.: The first ten years of public key cryptography. Proc. I.E.E.E. 76, 5 (1988).
[10]
Dinur, I., Shamir, A.: Cube Attacks on Tweakable Black Box Polynomials, EUROCRYPT 2009. Also on Cryptology ePrint Archive, Report 2008/385.
[11]
Fischer, W., Gammel, B.M., O. Kniffler, Velten, J.: Differential power analysis of stream ciphers. Lect. Notes Comput. Sci. 4377, 257-270 (2006).
[12]
Gaj, K., Southern, G., Bachimanchi, R.: Comparison of hardware performance of selected Phase II eSTREAM candidates. http://www.ecrypt.eu.org/stream/papersdir/2007/026.pdf. Accessed 29 Jan 2013.
[13]
Golic, J.D.: On the security of nonlinear filter generators. In: Gollmann, D. (ed.) FSE'96, LNCS, vol. 1039, pp. 173-188 (1996).
[14]
Golic, J.D., Clark, A.J., Dawson, E.P.: Generalized inversion attack on nonlinear filter generators. IEEE Trans. Comput. 49(10), 1100-1109 (2000).
[15]
Hawkes, P., Rose, G.: Guess-and-determine attacks on SNOW. In: Nyberg, K., Heys, H. (eds.) Selected Areas in Cryptography, SAC 2002, LNCS, vol. 2595, pp. 37-46. Springer-Verlag (2002).
[16]
Hell, M., Johansson, T., Maximov, A., Meier, W.: A stream cipher proposal: grain-128. In: IEEE International Symposium on Information Theory, pp. 1614-1618 (2006).
[17]
Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) Advances ins Cryptology--CRYPTO 1999, LNCS, vol. 1666, pp. 388-397. Springer-Verlag (1999).
[18]
Akkar, M., Giraud, C.: An implementation of DES and AES, secure against some attacks. In: Koc, C., Naccache, D., Paar, C. (eds.) Proceedings of CHES'01, LNCS, vol. 2162, pp. 309-318. Springer-Verlag (2001).
[19]
Maximov, A.: Cryptanalysis of the Grain family of stream ciphers. In: ACM Symposium on Information, Computer and Communications Security (ASIACCS'06), pp. 283-288 (2006).
[20]
Meier, W., Staffelbach, O.: Analysis of pseudo random sequences generated by cellular automata. In: Advances in Cryptology EUROCRYPT-91, LNCS, vol. 547, pp. 186-199. Springer (1991).
[21]
NIST Statistical Test Suit. http://csrc.nist.gov/rng/. Accessed 29 Jan 2013.
[22]
PalChaudhury, P., RoyChowdhury, D., Nandi, S., Chattopadhay, S.: Additive Cellular Automata Theory and Application, vol. 1. IEEE Computer Society Press, Los Alamitos, CA (1997).
[23]
Prouff, E.: DPA attacks and S-boxes. In: FSE 2005, LNCS vol. 3557, pp. 424-441 (2005).
[24]
Sarkar, P.: The filter-combiner model for memoryless synchronous stream ciphers. In: Yung, M. (ed.) Crypto, 2002, LNCS, vol. 2442, pp. 533-548. Springer (2002).
[25]
The Estream Project. http://www.ecrypt.eu.org/stream/. Accessed 29 Jan 2013.
[26]
Wolfram, S.: Random sequence generation by cellular automata. Adv. Appl. Math. 7, 123-169 (1986).
[27]
Wolfram, S.: Cryptography with cellular automata. In: Advances in Cryptology, Crypto-85, Proceedings, LNCS, vol. 218, pp. 429-432. Springer-Verlag (1986).

Cited By

View all
  • (2024)A Scheme for Symmetric Cryptosystem Using Large Cycle Reversible Cellular AutomataCellular Automata10.1007/978-3-031-71552-5_12(132-146)Online publication date: 9-Sep-2024
  • (2020)Search space reduction of asynchrony immune cellular automataNatural Computing: an international journal10.1007/s11047-020-09788-119:2(287-293)Online publication date: 1-Jun-2020
  • (2020)A survey of cellular automata: types, dynamics, non-uniformity and applicationsNatural Computing: an international journal10.1007/s11047-018-9696-819:2(433-461)Online publication date: 1-Jun-2020
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Cryptography and Communications
Cryptography and Communications  Volume 5, Issue 2
June 2013
93 pages

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 01 June 2013

Author Tags

  1. 94A60
  2. Cellular automata
  3. ESTREAM
  4. Grain family of stream ciphers
  5. Rule 30
  6. Stream cipher

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)A Scheme for Symmetric Cryptosystem Using Large Cycle Reversible Cellular AutomataCellular Automata10.1007/978-3-031-71552-5_12(132-146)Online publication date: 9-Sep-2024
  • (2020)Search space reduction of asynchrony immune cellular automataNatural Computing: an international journal10.1007/s11047-020-09788-119:2(287-293)Online publication date: 1-Jun-2020
  • (2020)A survey of cellular automata: types, dynamics, non-uniformity and applicationsNatural Computing: an international journal10.1007/s11047-018-9696-819:2(433-461)Online publication date: 1-Jun-2020
  • (2017)Discrete linear models for the generalized self-shrunken sequencesFinite Fields and Their Applications10.1016/j.ffa.2017.06.01047:C(222-241)Online publication date: 1-Sep-2017
  • (2016)Recovering the MSS-sequence via CAProcedia Computer Science10.1016/j.procs.2016.05.34680:C(599-606)Online publication date: 1-Jun-2016
  • (2016)A survey of lightweight stream ciphers for embedded systemsSecurity and Communication Networks10.1002/sec.13999:10(1226-1246)Online publication date: 10-Jul-2016
  • (2015)Cryptanalysing the Shrinking GeneratorProcedia Computer Science10.1016/j.procs.2015.05.45451:C(2893-2897)Online publication date: 1-Sep-2015

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media