Performance Analysis Of Secured Synchronous Stream Ciphers
Journal: International Journal of Communication Network and Security (Vol.1, No. 2)Publication Date: 2013-09-26
Authors : Padmalatha Eddla; R.Ravinder Reddy;
Page : 22-26
Keywords : Cryptanalysis; Mickey; Edon80; Trivium;
Abstract
The new information and communication technologies require adequate security. In the past decades ,we have witnessed an explosive growth of the digital storage and communication of data ,triggered by some important breakthroughs such as the Internet and the expansive growth of wireless communications. In the world of cryptography ,stream ciphers are known as primitives used to ensure privacy over communication channel and these are widely used for fast encryption of sensitive data. Lots of old stream ciphers that have been formerly used no longer be considered secure ,because of their vulnerability to newly developed cryptanalysis techniques. Many designs stream ciphers have been proposed in an effort to find a proper candidate to be chosen as world standard for data encryption. From these designs, the stream ciphers which are Trivium,Edon80 and Mickey are implemented in ‘c’ language with out affecting their security .Actually these algorithms are particularly suited for hardware oriented environments which provides considerable security and efficiency aspects. We will be targeting hardware applications, and good measure for efficiency of a stream cipher in this environment is the number of key stream bits generated per cycle per gate. For good efficiency we are approaching two ways .One approach is minimizing the number of gates.The other approach is to dramatically increase the number of bits for cycle. This allows reducing the clock frequency at the cost of an increased gate count. Apart from the implementation the analysis which includes the security of these algorithms against some attacks related to stream ciphers such as guess and deterministic attacks, correlation attacks, divide and conquer attacks and algebraic attacks are presented.
Other Latest Articles
- Detection Of Phishing Websites And Secure Transactions
- Group-Key Management Model for Worldwide Wireless Mesh Networks
- Dynamic Thread Pool based Service Tracking Manager
- Vegetable type faba bean lines identified-suitable for Eastern region of India
- Production and marketing of Marigold flowers in Uttar Pradesh with special reference to Kannauj district
Last modified: 2013-09-26 13:25:44