DOI QR코드

DOI QR Code

On a Parallel-Structured High-Speed Implementation of the Word-Based Stream Cipher

워드기반 스트림암호의 병렬화 고속 구현 방안

  • 이훈재 (동서대학교 컴퓨터정보공학부) ;
  • 도경훈 (동서대학교 컴퓨터정보공학부)
  • Received : 2009.12.17
  • Accepted : 2010.02.17
  • Published : 2010.04.30

Abstract

In this paper, we propose some parallel structures of the word-based nonlinear combining functions in word-based stream cipher, high-speed versions of general (bit-based) nonlinear combining functions. Especially, we propose the high-speed structures of popular four kinds in word-based nonlinear combiners using by PS-WFSR (Parallel-Shifting or Parallel-Structured Word-based FSR): m-parallel word-based nonlinear combiner without memory, m-parallel word-based nonlinear combiner with memories, m-parallel word-based nonlinear filter function, and m-parallel word-based clock-controlled function. In addition, we propose an implementation example of the m-parallel word-based DRAGON stream cipher, and determine its cryptographic security and performance.

본 논문에서는 일반적인 비트기반의 비선형 결합함수를 고속화하기 위하여 워드기반 스트림 암호에서 적용될 워드기반 비선형 결합함수 구조를 제안하였다. 특히, 워드기반 병렬구조를 갖는 PS-WFSR을 제안하였고, 이를 활용하여 비트 기반 비선형 결합함수를 고속화시킨 4가지 형태의 워드기반 병렬형 비선형 결합함수를 다음과 같이 제안하였다. m-병렬 워드기반 비메모리 비선형 결합함수, m-병렬 워드기반 메모리 비선형 결합함수, m-병렬 워드기반 비선형 필터함수, m-병렬 워드기반 클럭조절형 함수를 제안하였고, 마지막으로 m-병렬 워드기반 DRAGON의 병렬 구조를 통하여 그 성능을 분석하였다.

Keywords

References

  1. NESSIE site at http://www.cosic.esat.kuleuven.ac.be/nessie/.
  2. ECRYPT, eSTREAM site at http://www.ecrypt.eu.org/stream/.
  3. J. Daemen, V. Rijmen, "The Block Cipher Rijndael," Smart Card Research and Applications, LNCS 1820, Springer-Verlag, 2000, pp. 288-296.
  4. A. Clark, E. Dawson, J. Fuller, J. Golic, Hoon-Jae Lee, W. Millan, Sang-Jae Moon, L. Simpson, "The LILI-II Keystream Generator," LNCS 2384 (ACISP'2002), pp.25-39, Jul. 2002.
  5. Sober-t16, t-32 at http://www.cosic.esat.kuleuven.ac.be/nessie/workshop/submission.html.
  6. Hoonjae Lee and Sangjae Moon, "Parallel Stream Cipher for Secure High-Speed Communications," Signal Processing, Vol. 82, No. 2, pp. 259-265, Feb. 2002. https://doi.org/10.1016/S0165-1684(01)00180-3
  7. B. Schneier, Applied Cryptography, 2nd Ed., Jhon Wiley & Sons, Inc., 1996.
  8. R. A. Rueppel, Analysis and Design of Stream Ciphers, Springer-Verlag, 1986.
  9. R. A. Rueppel, "Correlation Immunity and the Summation Generator," In Proceedings of CRYPTO'85, pp. 260-272, 1985.
  10. Hoonjae Lee, Sangjae Moon, "On An Improved Summation Generator with 2-Bit Memory," Signal Processing, Vol. 80, No.1. pp. 211-217, Jan. 2000. https://doi.org/10.1016/S0165-1684(99)00123-1
  11. W. Meier and O. Staffelbach, "Correlation Properties of Combiners with Memory in Stream Ciphers," Journal of Cryptology, Vol.5, pp.67-86, 1992.
  12. K. Chen, M. Henrickson, W.Millan, J. Fuller, A. Simpson, Ed Dawson, Hoonjae Lee, Sangjae Moon, "Dragon: A Fast Word Based Stream Cipher," LNCS, Vol. 3505, Dec. 2004.