A New Class of Single Cycle T-Functions

  • Jin Hong
  • Dong Hoon Lee
  • Yongjin Yeom
  • Daewan Han
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3557)


T-function is a relatively new cryptographic building block suitable for streamciphers. It has the potential of becoming a substitute for LFSRs, and those that correspond to maximum length LFSRs are called single cycle T-functions. We present a family of single cycle T-functions, previously unknown. An attempt at building a hardware oriented streamcipher based on this new T-function is given.


T-function single cycle streamcipher 


  1. 1.
    Crypto++ 5.2.1 benchmarks, Available from
  2. 2.
    NIST. A statistical test suite for random and psedorandom number generators for cryptographic applications. NIST Special Publication 800-22Google Scholar
  3. 3.
    Anashin, V.S.: Uniformly distributed sequences over p-adic integers. In: van der Poorten, A.J., Shparlinsky, I., Zimmer, H.G. (eds.) Proceedings of the Int’l. Conference on Number Theoretic and Algebraic Methods in Computer Science. World Scientific, Singapore (1995)Google Scholar
  4. 4.
    Anashin, V.S.: Private communicationGoogle Scholar
  5. 5.
    Armknecht, F., Krause, M.: Algebraic attacks on combiners with memory. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 162–175. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  6. 6.
    Boesgaard, M., Vesterager, M., Pedersen, T., Christiansen, J., Scavenius, O.: Rabbit: A new high-performance stream cipher. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 307–329. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  7. 7.
    Babbage, S.: Stream ciphers: What does the industry want? Presented at State of the Art of Stream Ciphers workshop, Brugge (2004)Google Scholar
  8. 8.
    Biryukov, A., Shamir, A.: Cryptanalytic time/Memory/Data tradeoffs for stream ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 1–13. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  9. 9.
    Chen, K., Henricksen, M., Millan, W., Fuller, J., Simpson, L., Dawson, E., Lee, H., Moon, S.: Dragon: A fast word based stream cipher. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 33–50. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  10. 10.
    Clark, A., Dawson, E., Fuller, J., Golić, J.D., Lee, H.-J., Millan, W.L., Moon, S.-J., Simpson, L.R.: The LILI-II keystream generator. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol. 2384, p. 25. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  11. 11.
    Courtois, N.T.: Algebraic attacks on combiners with memory and several outputs. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 3–20. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  12. 12.
    Courtois, N.T.: Higher order correlation attacks,XL algorithm and cryptanalysis of toyocrypt. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 182–199. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  13. 13.
    Courtois, N., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 345–359. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  14. 14.
    Ekdahl, P., Johansson, T.: A new version of the stream cipher SNOW. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 47–61. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  15. 15.
    Ferguson, N., Whiting, D., Schneier, B., Kelsey, J., Lucks, S., Kohno, T.: Helix: Fast encryption and authentication in a single cryptographic primitive. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 330–346. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  16. 16.
    Hawkes, P., Rose, G.: Primitive specification and supporting documentation for SOBER-t32, NESSIE Submission (2000)Google Scholar
  17. 17.
    Halevi, S., Coppersmith, D., Jutla, C.S.: Scream: A software-efficient stream cipher. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 195–209. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  18. 18.
    Hong, J., Lee, D.H., Yeom, Y., Han, D.: A new class of single cycle T-functions and a stream cipher proposal. In: SASC(State of the Art of Stream Ciphers), Brugge, Belgium (October 2004), workshop record. Available from
  19. 19.
    Junod, P., Kuenzlie, S., Meier, W.: Attacks on TSC. FSE 2005 rump session presentation (2005)Google Scholar
  20. 20.
    Klimov, A., Shamir, A.: A new class of invertible mappings. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 470–483. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  21. 21.
    Klimov, A., Shamir, A.: Cryptographic application of T-functions. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 248–261. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  22. 22.
    Klimov, A., Shamir, A.: New cryptographic primitives based on multiword T-functions. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 1–15. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  23. 23.
    Klimov, A., Shamir, A.: The TFi family of stream ciphers. In: Handout at the State of the Art of Stream Ciphers workshop, Brugge (2004)Google Scholar
  24. 24.
    Lee, D.-H., Kim, J.H., Hong, J., Han, J.W., Moon, D.: Algebraic attacks on summation generators. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 34–48. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  25. 25.
    Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1994)Google Scholar
  26. 26.
    McGrew, D., Fluhrer, S.: The stream cipher LEVIATHAN. NESSIE Submission (2000)Google Scholar
  27. 27.
    Mitra, J., Sarkar, P.: Time-memory trade-off attacks on multiplications and T-functions. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 468–482. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  28. 28.
    Shamir, A.: Dead or alive? Invited talk presented at State of the Art of Stream Ciphers workshop. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, p. 78. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  29. 29.
    Sugimoto, K., Chikaraishi, T., Morizumi, T.: Design criteria and security evaluations on certain stream ciphers. IEICE Technical Report, ISEC20000-69 (September 2000)Google Scholar
  30. 30.
    Watanabe, D., Furuya, S., Yoshida, H., Takaragi, K., Preneel, B.: A new keystream generator MUGI. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 179–194. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  31. 31.
    Wu, H.: A new stream cipher HC-256. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 226–244. Springer, Heidelberg (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Jin Hong
    • 1
  • Dong Hoon Lee
    • 1
  • Yongjin Yeom
    • 1
  • Daewan Han
    • 1
  1. 1.National Security Research InstituteDaejeonKorea

Personalised recommendations