Computer Science ›› 2017, Vol. 44 ›› Issue (8): 146-150.doi: 10.11896/j.issn.1002-137X.2017.08.026

Previous Articles     Next Articles

Design and Characteristic Study on Fast Stream Cipher Algorithm Based on Camellia

DING Jie, SHI Hui, GONG Jing and DENG Yuan-qing   

  • Online:2018-11-13 Published:2018-11-13

Abstract: As the encryption standard of the block cipher of NESSIE,Camellia algorithm has the same security and applicability as AES algorithm.In this paper,a novel fast stream cipher algorithm was proposed based on Camellia algorithm.The idea is to extract parts of the internal state at certain round function F and give them as the output keystream.We analyzed the relative characteristics of the new algorithm.The result shows that the new algorithm achieves almost the same performance as the optimal performance obtained in LEX,in terms of keystream generation speed and randomness.Besides,it can resist slide attack,with both input and key changing in each Camellia module.

Key words: Stream cipher,Camellia,Randomness,Security,Fast

[1] 邓元庆,龚晶,石会.密码学简明教程[M].北京:清华大学出版社,2011:71-105.
[2] European Union.European Project IST-1999-12324:New European Schemes for Signatures,Integrity,and Encryption[EB/OL].[2002-03-16].http://www.cosic.esat.kuleuven.be/nessie.
[3] Randomness Test Specification:GM/T0005-2012[S].Beijing:Standards Press of China,2012.(in Chinese) 随机性检测检测规范:GM/T0005-2012[S].北京:中国标准出版社,2012
[4] BIRYUKOV A.A new 128 bit Key Stream Cipher LEX [EB/OL].[2005-06-13].http://www.ecrypt.eu.org /stre-am/chip-hers /lex/lex.pdf.
[5] LI J Y,SHI H,DENG Y Q,et al.Improvement and Analysis on Slide Attack-Resistant Stream Cipher LEX[J].Communications Technology,2015,8(2):203-207.(in Chinese) 李佳雨,石会,邓元庆,等.抗滑动攻击的LEX算法改进及分析[J].通信技术,2015,8(2):203-207.
[6] LI J Y,SHI H,DENG Y Q,et al.Differential Fault Attack and Analysis of Improvement on LEX[J].Computer Science,2015,2(11A):352-356.(in Chinese) 李佳雨,石会,邓元庆,等.针对流密码LEX的差分故障攻击及算法改进分析[J].计算机科学,2015,2(11A):352-356.
[7] WU H J,PRENEEL B.Attacking the IV Setup of Stream Cipher LEX[EB/OL].[2006-03-15].http://www.ecrypt.eu.org/stream/papersdir/059.pdf.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .