“Strumok” stream cipher
Journal Title: КОМП’ЮТЕРНІ НАУКИ ТА КІБЕРБЕЗПЕКА - Year 2018, Vol 1, Issue 9
Abstract
This work presents the main developing results of a new keystream generator, which named “Strumok”, and offered as a candidate for the national symmetric encryption standard of Ukraine. “Strumok” is built on SNOW 2.0-likes schema of the summation generator. Increased secret key length and the initialization vector allow using reliably the stream cipher even taking into account quantum cryptographic analysis methods. Unlike SNOW 2.0, Strumok is designed for use in more powerful 64-bit computing systems. The conducted comparative tests have shown that the “Strumok” on 32-bit computing systems also shows good performance results. There are basic transformation and individual results from the cipher performance research, here is it is shown the generator, which is capable of forming a keystream at speeds exceed of 10 Gbit per sec.
Authors and Affiliations
Ivan Gorbenko, Alexandr Kuznetsov, Yurii Gorbenko, Anton Alekseychuk, Vlad Tymchenko
Code-Based Public-Key Cryptosystems: the current state, the existing contradictions and prospects of practical use for the post-quantum period
Discusses the asymmetric cryptosystem based on algebraic coding, are investigated with temporary status, controversies and prospects of practical use for the post-quantum period. We propose a new scheme of crypto-transfo...
ALGEBRAIC IMMUNITY OF SYMMETRIC CIPHERS
A key component of modern symmetric ciphers are nonlinear blocks (non-linear substitutions, substitution tables, S-boxes) that perform functions of hiding statistical links of plaintext and ciphertext, mixing and dissemi...
ПРО СЛАБКІСТЬ S ПЕРЕТВОРЕННЯ ШИФРУ СТРУМОК З ЛАНЦЮЖКА КЕРОВАНИХ S-БЛОКІВ
Обговорюються особливості побудування S-перетворення шифру Струмок. Зокрема, виконано аналіз пропозиції щодо побудови S-перетворення шифру Струмок з використанням керованих S-блоків. Оцінюються показники його випадковост...
NTRU Prime IIT Ukraine encryption algorithm with consideration known attacks analysis
The paper deals with the modern cryptographic transformations of the asymmetric end-to-end encryption type, namely – NTRU-like cryptographic systems. A new cryptographic system NTRU Prime IIT Ukraine was created based on...
Mathematical model and methods of processing biometric images of fingerprints
Today, using of personal identification technologies based on biometric parameters for access to information resources is becoming topical in connection with the increase of informatization in modern society. Physical ch...