2009
DOI: 10.1007/978-3-642-11145-7_5
|View full text |Cite
|
Sign up to set email alerts
|

The rakaposhi Stream Cipher

Abstract: Abstract. In this paper, we introduce the rakaposhi stream cipher. The algorithm is based on Dynamic Linear Feedback Shift Registers, with a simple and potentially scalable design, and is particularly suitable for hardware applications with restricted resources. The rakaposhi stream cipher offers 128-bit security, and aims to complement the current eSTREAM portfolio of hardware-oriented stream ciphers.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(15 citation statements)
references
References 23 publications
0
15
0
Order By: Relevance
“…Table 1 lists the values of the 3-tuples (n, n − d, d) for 4 ≤ n ≤ 25. The case n = 4 is trivial, and it is easy to verify that for any k ∈ D d (f ), when n = 6, 8,9,11,12,13,14,15,17,18,21, k always contains two adjacent loop zero runs of length 2, and when n = 16, 19, 20 and n ≥ 22, k has at least one loop zero runs with length no less than 3, which contradicts Lemmas 16 and 10 respectively. Thus we have d ≥ d n .…”
Section: The Case R(k) =mentioning
confidence: 76%
See 1 more Smart Citation
“…Table 1 lists the values of the 3-tuples (n, n − d, d) for 4 ≤ n ≤ 25. The case n = 4 is trivial, and it is easy to verify that for any k ∈ D d (f ), when n = 6, 8,9,11,12,13,14,15,17,18,21, k always contains two adjacent loop zero runs of length 2, and when n = 16, 19, 20 and n ≥ 22, k has at least one loop zero runs with length no less than 3, which contradicts Lemmas 16 and 10 respectively. Thus we have d ≥ d n .…”
Section: The Case R(k) =mentioning
confidence: 76%
“…The composite Tr(λx −1 ) of these two functions possess many good cryptographic properties as well, including balanceness, high nonlinearity, ideal auto-correlation, etc [11] , and have been adopted by many stream ciphers such as SFINKS [12] (the eStream project), RAKAPOSHI [13] , the simple counter stream cipher (SCSC) proposed by Si and Ding [11] , and so on.…”
Section: Introductionmentioning
confidence: 99%
“…Finally, the keystream output is generated by linear combination of the outputs of both registers A and B with the output of the N LF function. The reader interested in more detail is referred to the original paper [1].…”
Section: Description Of Rakaposhi Stream Ciphermentioning
confidence: 99%
“…The Rakaposhi stream cipher was designed by Cid, Kiyomoto, and Kurihara in 2009 (see [1]). The cipher is based on a non-linear feedback shift register (NLFSR) and a dynamic linear shift register (DLFSR).…”
Section: Introductionmentioning
confidence: 99%
“…As a result, lightweight cryptography is attracting attention of the cryptographic community. A host of lightweight cryptographic algorithms that particularly target for low resource devices have been proposed in the past few years, e.g., block ciphers such as mCrypton [1], HIGHT [2], PRESENT [3], KATAN&KT-ANTAN [4], TWIS [5], MIBS [6], PRINTcipher [7], LED [8], Piccolo [9], KLEIN [10], LBlock [11], TWINE [12] and PRINCE [13], and hash functions such as Quark [14], SPONGENT [15] and PHOTON [16], as well as stream ciphers such as Grain v1 [17], MICKEY 2.0 [18], Trivium [19] Manuscript received October 24, 2013;revised and RAKAPOSHI [20]. Lightweight cryptography is getting more and more important since people started interacting with it in daily life more often.…”
Section: Introductionmentioning
confidence: 99%