Abstract
MUGI [15] is a word-based stream cipher designed for 64-bit architectures. It uses a 128-bit master key and a 128-bit initialization vector to populate a large non-linear feedback shift register (NLFSR) and additional non-linear state (NLS). In standard benchmarks on 32-bit processors, MUGI suffers from poor key agility because it is implemented on an architecture for which it is not designed, and because its NLFSR is too large relative to the size of its master key. This paper proposes a variant of MUGI, entitled MUGI-M, to enhance key agility, and concludes with an analysis of its security and performance characteristics.
Chapter PDF
Similar content being viewed by others
References
Anonymous. RC4 algorithm revealed. Posting to sci.crypt usenet group (September 14, 1994), Available at: ftp://idea.sec.dsi.unimi.it/pub/security/crypt/code/rc4.revealed.gz
Biryukov, A., Shamir, A.: Analysis of the non-linear part of MUGI. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 320–329. Springer, Heidelberg (2005)
Boesgaard, M., Vesterager, M., Pedersen, T., Christiansen, J., Scavenius, O.: Rabbit: a new high-performance stream cipher. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 307–329. Springer, Heidelberg (2003)
Chen, K., Henricksen, M., Simpson, L., Millian, W., Dawson, E.: Dragon: A fast word based cipher. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 33–50. Springer, Heidelberg (2005)
Daemen, J., Clapp, C.: Fast hashing and stream encryption with PANAMA. In: Vaudenay, S. (ed.) FSE 1998. LNCS, vol. 1372, pp. 60–74. Springer, Heidelberg (1998)
Daemen, J., Rijmen, V.: Rijndael. In: Proceedings from the First Advanced Encryption Standard Candidate Conference, National Institute of Standards and Technology (NIST) (August 1998), Available at: http://csrc.nist.gov/encryption/aes/
Dawson, E., Carter, G., Gustafson, H., Henricksen, M., Millan, W., Simpson, L.: Evaluation of the MUGI psuedo-random number generator. Technical report, CRYPTREC, Information Technology Promotion Agency (IPA), Tokyo, Japan (2002), Available at: www.ipa.go.jp/security/enc/CRYPTREC/fy15/doc/1035_IPA-MUGI_report_final.pdf
Ekdahl, P., Johansson, T.: Snow - a new stream cipher (2000), Available at: http://www.it.lth.se/cryptology/snow/
Boesgaard, M., Vesterager, M., Pedersen, T., Christiansen, J., Scavenius, O.: Rabbit: A new high-performance stream cipher. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 307–329. Springer, Heidelberg (2003)
Golic, J.: Security evaluation of MUGI. Technical report, CRYPTREC, Information Technology Promotion Agency (IPA), Japan, Tokyo (2002)
Halevi, S., Coppersmith, D., Jutla, C.: Scream: A software-efficient stream cipher. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 195–209. Springer, Heidelberg (2003)
Mihaeljevic, M.: Report on security evaluation of MUGI stream cipher. Technical report, CRYPTREC, Information Technology Promotion Agency (IPA), Tokyo, Japan (2002)
Rose, G., Hawkes, P.: Turing: a fast stream cipher. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 290–306. Springer, Heidelberg (2003)
Watanabe, D., Furuya, S., Yoshida, H., Takaragi, K.: MUGI psuedorandom number generator, self evaluation (2001), Available at: http://www.sdl.hitachi.co.jp/crypto/mugi/index-e.html
Watanabe, D., Furuya, S., Yoshida, H., Takaragi, K., Preneel, B.: A new keystream generator MUGI. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 179–194. Springer, Heidelberg (2003)
Wu, H.: A New Stream Cipher HC-256 (2004), Available at: http://eprint.iacr.org/2004/092.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Henricksen, M., Dawson, E. (2006). Rekeying Issues in the MUGI Stream Cipher. In: Preneel, B., Tavares, S. (eds) Selected Areas in Cryptography. SAC 2005. Lecture Notes in Computer Science, vol 3897. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11693383_12
Download citation
DOI: https://doi.org/10.1007/11693383_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-33108-7
Online ISBN: 978-3-540-33109-4
eBook Packages: Computer ScienceComputer Science (R0)