“Strumok” stream cipher
Journal Title: КОМП’ЮТЕРНІ НАУКИ ТА КІБЕРБЕЗПЕКА - Year 2018, Vol 1, Issue 9
Abstract
This work presents the main developing results of a new keystream generator, which named “Strumok”, and offered as a candidate for the national symmetric encryption standard of Ukraine. “Strumok” is built on SNOW 2.0-likes schema of the summation generator. Increased secret key length and the initialization vector allow using reliably the stream cipher even taking into account quantum cryptographic analysis methods. Unlike SNOW 2.0, Strumok is designed for use in more powerful 64-bit computing systems. The conducted comparative tests have shown that the “Strumok” on 32-bit computing systems also shows good performance results. There are basic transformation and individual results from the cipher performance research, here is it is shown the generator, which is capable of forming a keystream at speeds exceed of 10 Gbit per sec.
Authors and Affiliations
Ivan Gorbenko, Alexandr Kuznetsov, Yurii Gorbenko, Anton Alekseychuk, Vlad Tymchenko
PERIODIC CHARACTERISTICS OF OUTPUT FEEDBACK ENCRYPTION MODE
We investigate periodic characteristics of sequence of output blocks in the output feedback encryption mode. The model of random homogeneous substitution is used for an abstract description of this formation. This proper...
METHODS OF ENSURING ELECTROMAGNETIC COMPATIBILITY IN MODERN INFORMATION COMMUNICATION SYSTEMS
Requirements are formulated for the choice of complex signals systems – data carriers for use in multi-user broadband telecommunication systems (BTS), which are increased requirements for noise immunity, electromagnetic...
Methods and results of electronic signatures with appendix and message recovery comparative analysis
The paper deals with the comparative analysis methods of electronic signature mechanisms properties. The existing methods of comparative analysis of electronic signatures based on expert estimations methods – analytic hi...
Стратегія вибору S-блоків для нелінійного перетворення шифру струмок
Обговорюються особливості побудування S-перетворення шифру Струмок. Зокрема увага зосереджується на виборі S-блоків для цього перетворення. Оцінюються показники його випадковості, зокрема визначається мінімальне число ци...
Mathematical model and methods of processing biometric images of fingerprints
Today, using of personal identification technologies based on biometric parameters for access to information resources is becoming topical in connection with the increase of informatization in modern society. Physical ch...