Advertisement

Comprehensive Study of Existing Stream Ciphers

  • S. ChaithanyaEmail author
  • V. Anitha
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 98)

Abstract

Now a day’s internet of things is one of the rapidly growing research field in the information technology domain. Offering security for this ever-augmenting technology is still remaining as the challenging task. Cryptographic techniques are used to authenticate and maintain confidentiality of message data. To maintain the security, system cryptographic algorithms and protocols are very essential. The system is mainly categorized into two groups namely stream cipher and block cipher. Stream cipher has its own advantage over block cipher. In this paper, we reviewed some of the stream ciphers. Selection of finest algorithms for the security of internet of things is very difficult in terms of energy and storage. The study aims to summarize some of the existing stream cipher techniques. This paper gives details on fundamental knowledge about encryption algorithms and its comparison. We also describe the design considerations of stream ciphers.

Keywords

Cryptography Security Stream cipher Block cipher Internet of things Encryption algorithms 

References

  1. 1.
    Ashouri, M.: Design of a New Stream Cipher: PALS (2018)Google Scholar
  2. 2.
    Ali, A.: Oppel-2: a new family of FCSR-based stream ciphers. In: 2014 International Conference on Emerging Technologies (ICET), pp. 75–80, Islamabad (2014).  https://doi.org/10.1109/icet.2014.7021020
  3. 3.
    Berbain, C., et al.: DECIM, a new stream cipher for hardware applications (2005)Google Scholar
  4. 4.
    Ghafari, V.A., Hu, H.: Fruit: ultra-lightweight stream cipher with shorter internal state. IACR Cryptology ePrint Archive 2016/355 (2016)Google Scholar
  5. 5.
    Ghafari, A.V., Hu, H.: Fruit-80: a secure ultra-lightweight stream cipher for constrained environments. Entropy 20, 180 (2018)CrossRefGoogle Scholar
  6. 6.
    Hamann, M., et al.: LIZARD - a lightweight stream cipher for power-constrained devices. IACR Trans. Symmetric Cryptol. 2017, 45–79 (2016)Google Scholar
  7. 7.
    Hell, M., Johansson, T., Meier, W.: Grain: a stream cipher for constrained environments. IJWMC 2, 86–93 (2007).  https://doi.org/10.1504/IJWMC.2007.013798CrossRefGoogle Scholar
  8. 8.
    Hell, M., Johansson, T., Maximov, A., Meier, W.: A stream cipher proposal: grain-128. In: 2006 IEEE International Symposium on Information Theory, pp. 1614–1618, Seattle (2006).  https://doi.org/10.1109/isit.2006.261549
  9. 9.
    Biryukov, A.: Design of a new stream cipher—LEX. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol. 4986. Springer, Heidelberg (2008)Google Scholar
  10. 10.
    Kuznetsov, O., Lutsenko, M., Ivanenko, D.: Strumok stream cipher: specification and basic properties. In: 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T), pp. 59–62, Kharkiv (2016).  https://doi.org/10.1109/infocommst.2016.7905335
  11. 11.
    Anashin, V., Bogdanov, A., Kizhvatov, I.: ABC: A New Fast Flexible Stream Cipher- eSTREAM, ECRYPT Stream Cipher Project, Report 2005/050 (2005)Google Scholar
  12. 12.
    Lee, H., Chen, K.: PingPong-128, a new stream cipher for ubiquitous application. In: 2007 International Conference on Convergence Information Technology (ICCIT 2007), pp. 1893–1899, Gyeongju (2007).  https://doi.org/10.1109/iccit.2007.375
  13. 13.
    Gammel, B., Göttfert, R., Kniffler, O.: The Achterbahn stream cipher (2005)Google Scholar
  14. 14.
    Bernstein, D.J.: The Salsa20 family of stream ciphers (2007)Google Scholar
  15. 15.
    Bernstein, D.J.: ChaCha, a variant of Salsa20. In: Workshop Record of SASC (2008)Google Scholar
  16. 16.
    De Cannière, C.: Trivium: a stream cipher construction inspired by block cipher design principles. In: Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) Information Security, ISC 2006. LNCS, vol. 4176. Springer, Heidelberg (2006)Google Scholar
  17. 17.
    De Cannière, C., Preneel, B.: TRIVIUM — specifications. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/030 (2005). http://www.ecrypt.eu.org/stream
  18. 18.
    Nawaz, Y., Gong, G.: The WG stream cipher (2005)Google Scholar
  19. 19.
    Boesgaard, M., Vesterager, M., Pedersen, T., Christiansen, J., Scavenius, O.: Rabbit: a high-performance stream cipher. In: Proceedings of FSE 2003. LNCS, vol. 2887, pp. 307–329, Springer (2003)Google Scholar
  20. 20.
    Mantin, I.: Analysis of the Stream Cipher RC4 (2001)Google Scholar
  21. 21.
    Paul, G., Maitra, S., Chattopadhyay, A.: Quad-RC4: Merging Four RC4 States towards a 32-bit Stream Cipher.. IACR Cryptology ePrint Archive. 2013:572 (2013)Google Scholar
  22. 22.
    Stallings, W.: Cryptography And Network Security Principles And Practice. 4th edn. Pearson Education (2017)Google Scholar
  23. 23.
    Stallings, W.: Network Security Essentials: Applications and Standards. Prentice Hall (2003)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of ECERajarajeswari College of EngineeringBangaloreIndia
  2. 2.Department of ECEDayananda Sagar College of EngineeringBangaloreIndia

Personalised recommendations