Abstract
T-function is a relatively new cryptographic building block suitable for streamciphers. It has the potential of becoming a substitute for LFSRs, and those that correspond to maximum length LFSRs are called single cycle T-functions. We present a family of single cycle T-functions, previously unknown. An attempt at building a hardware oriented streamcipher based on this new T-function is given.
Chapter PDF
Similar content being viewed by others
References
Crypto++ 5.2.1 benchmarks, Available from http://www.eskimo.com/~weidai/benchmarks.html
NIST. A statistical test suite for random and psedorandom number generators for cryptographic applications. NIST Special Publication 800-22
Anashin, V.S.: Uniformly distributed sequences over p-adic integers. In: van der Poorten, A.J., Shparlinsky, I., Zimmer, H.G. (eds.) Proceedings of the Int’l. Conference on Number Theoretic and Algebraic Methods in Computer Science. World Scientific, Singapore (1995)
Anashin, V.S.: Private communication
Armknecht, F., Krause, M.: Algebraic attacks on combiners with memory. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 162–175. Springer, Heidelberg (2003)
Boesgaard, M., Vesterager, M., Pedersen, T., Christiansen, J., Scavenius, O.: Rabbit: A new high-performance stream cipher. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 307–329. Springer, Heidelberg (2003)
Babbage, S.: Stream ciphers: What does the industry want? Presented at State of the Art of Stream Ciphers workshop, Brugge (2004)
Biryukov, A., Shamir, A.: Cryptanalytic time/Memory/Data tradeoffs for stream ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 1–13. Springer, Heidelberg (2000)
Chen, K., Henricksen, M., Millan, W., Fuller, J., Simpson, L., Dawson, E., Lee, H., Moon, S.: Dragon: A fast word based stream cipher. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 33–50. Springer, Heidelberg (2005)
Clark, A., Dawson, E., Fuller, J., Golić, J.D., Lee, H.-J., Millan, W.L., Moon, S.-J., Simpson, L.R.: The LILI-II keystream generator. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol. 2384, p. 25. Springer, Heidelberg (2002)
Courtois, N.T.: Algebraic attacks on combiners with memory and several outputs. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 3–20. Springer, Heidelberg (2005)
Courtois, N.T.: Higher order correlation attacks,XL algorithm and cryptanalysis of toyocrypt. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 182–199. Springer, Heidelberg (2003)
Courtois, N., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 345–359. Springer, Heidelberg (2003)
Ekdahl, P., Johansson, T.: A new version of the stream cipher SNOW. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 47–61. Springer, Heidelberg (2003)
Ferguson, N., Whiting, D., Schneier, B., Kelsey, J., Lucks, S., Kohno, T.: Helix: Fast encryption and authentication in a single cryptographic primitive. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 330–346. Springer, Heidelberg (2003)
Hawkes, P., Rose, G.: Primitive specification and supporting documentation for SOBER-t32, NESSIE Submission (2000)
Halevi, S., Coppersmith, D., Jutla, C.S.: Scream: A software-efficient stream cipher. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 195–209. Springer, Heidelberg (2002)
Hong, J., Lee, D.H., Yeom, Y., Han, D.: A new class of single cycle T-functions and a stream cipher proposal. In: SASC(State of the Art of Stream Ciphers), Brugge, Belgium (October 2004), workshop record. Available from http://www.isg.rhul.ac.uk/research/projects/ecrypt/stvl/sasc.html
Junod, P., Kuenzlie, S., Meier, W.: Attacks on TSC. FSE 2005 rump session presentation (2005)
Klimov, A., Shamir, A.: A new class of invertible mappings. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 470–483. Springer, Heidelberg (2003)
Klimov, A., Shamir, A.: Cryptographic application of T-functions. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 248–261. Springer, Heidelberg (2004)
Klimov, A., Shamir, A.: New cryptographic primitives based on multiword T-functions. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 1–15. Springer, Heidelberg (2004)
Klimov, A., Shamir, A.: The TFi family of stream ciphers. In: Handout at the State of the Art of Stream Ciphers workshop, Brugge (2004)
Lee, D.-H., Kim, J.H., Hong, J., Han, J.W., Moon, D.: Algebraic attacks on summation generators. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 34–48. Springer, Heidelberg (2004)
Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1994)
McGrew, D., Fluhrer, S.: The stream cipher LEVIATHAN. NESSIE Submission (2000)
Mitra, J., Sarkar, P.: Time-memory trade-off attacks on multiplications and T-functions. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 468–482. Springer, Heidelberg (2004)
Shamir, A.: Dead or alive? Invited talk presented at State of the Art of Stream Ciphers workshop. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, p. 78. Springer, Heidelberg (2004)
Sugimoto, K., Chikaraishi, T., Morizumi, T.: Design criteria and security evaluations on certain stream ciphers. IEICE Technical Report, ISEC20000-69 (September 2000)
Watanabe, D., Furuya, S., Yoshida, H., Takaragi, K., Preneel, B.: A new keystream generator MUGI. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 179–194. Springer, Heidelberg (2002)
Wu, H.: A new stream cipher HC-256. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 226–244. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hong, J., Lee, D.H., Yeom, Y., Han, D. (2005). A New Class of Single Cycle T-Functions. In: Gilbert, H., Handschuh, H. (eds) Fast Software Encryption. FSE 2005. Lecture Notes in Computer Science, vol 3557. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11502760_5
Download citation
DOI: https://doi.org/10.1007/11502760_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-26541-2
Online ISBN: 978-3-540-31669-5
eBook Packages: Computer ScienceComputer Science (R0)