A STATISTICAL ANALYSIS OF SOME STANDARD CIPHERS’ CRYPTOGRAPHIC PRIMITIVES
Bassett, Robert L.
MetadataShow full item record
Encryption is ubiquitous in the modern environment. While public/private key architecture has provided an amazing and powerful way to encrypt information so that only one intended recipient can decrypt, the computation required for this approach means that this encryption method can quickly grow extremely expensive. With that in mind, there are a variety of open-source stream ciphers that seek to provide relatively inexpensive stream ciphers to securely encrypt information. But these stream ciphers all operate using very different techniques to generate their keystream, as seen in the stark differences in paradigms between ciphers. As such, it is not immediately clear what operations are required to achieve the desired level of encryption. What cryptographic primitives are most common or efficacious in achieving security? Examining the Data Encryption Standard, Advanced Encryption Standard, and the stream cipher winners of the eStream II competition, an underlying trend composed of two operations emerges. Despite observing no clear n-grams defining precise cryptographic primitives, we identify a general structure common to all stream ciphers. Additionally, we identify that substitution boxes or multiplication operations are not necessary for stream ciphers, whereas addition and rotation operations seem to be essential.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Maitra, S.; Mandal, B.; Martinsen, T.; Roy, D.|Stănică, P. (IEEE, 2020);distributed. However, in the case of some stream ciphers, a keystream bit is generated by using a nonlinear Boolean function with inputs from a restricted domain. At Eurocrypt 2016, one such stream cipher (FLIP) has been ...
Rosenberg, Nathanial Owen (Monterey, California. Naval Postgraduate School, 2012-06);Todays most efficient and widely used cryptographic standards such as RSA rely on the difficulty of factoring large numbers to resist cryptanalysis. Asymmetric cryptography is used in a plethora of sensitive operations ...
Leader, Jeffery J.; Heyman, James E. (Monterey, California. Naval Postgraduate School, 1993); NPS-MA-93-016Applications such as stream ciphers and spread spectra require the generation of binary keystreams to implement, and the simulation of such keystreams to break. Most cryptanalytic attacks are of the known generator type, ...