Advertisement

Highly Reliable Synchronous Stream Cipher System for Link Encryption

  • HoonJae Lee
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3982)

Abstract

A highly reliable synchronous stream cipher system with absolute synchronization is proposed. The proposed system includes an improved initial synchronization with highly reliable keystream synchronization in a noisy channel (about BER=0.1). Furthermore, encryption algorithms with a LILI-II, a Dragon and a Parallel LM for data confidentiality, and a zero-suppression algorithm for system stabilization are all designed and analyzed.

Keywords

Keystream stream cipher synchronization randomness 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. John Wiley and Sons, Inc., New York (1996)zbMATHGoogle Scholar
  2. 2.
    Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)zbMATHGoogle Scholar
  3. 3.
    Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Trans. on Infor. Theory IT-22(6), 644–654 (1976)zbMATHCrossRefMathSciNetGoogle Scholar
  4. 4.
    Rueppel, R.A.: Analysis and Design of Stream Ciphers. Springer, Heidelberg (1986)zbMATHGoogle Scholar
  5. 5.
    Lee, H., Moon, S.: On An Improved Summation Generator with 2-Bit Memory. Signal Processing 80(1), 211–217 (2000)zbMATHCrossRefGoogle Scholar
  6. 6.
    Tatebayashi, M., Matsuzaki, N., Newman, D.B.: A Cryptosystem using Digital Signal Processors for Mobile Communication. In: ICASSP 1990, pp. 37.1.1 - 37.1.4 (1990)Google Scholar
  7. 7.
    Lee, H., Moon, S.: A Zero-Suppression Algorithm for the synchronous stream cipher. Applied Signal Processing 5(4), 240–243 (1998)CrossRefGoogle Scholar
  8. 8.
    Moon, S., Lee, P.: A Propose of a Key Distribution Protocol. In: The Proceeding of The Korean Workshop on Information Security and Cryptography, WISC 1990, pp. 117–124 (1990)Google Scholar
  9. 9.
    Proakis, J.: Digital Communications, 3rd edn. McGraw-Hill, Inc., New York (1995)Google Scholar
  10. 10.
    van Tilborg, H.C.A.: Fundamentals of Cryptology. Kluwer Academic Publishers, Dordrecht (2000)zbMATHGoogle Scholar
  11. 11.
    Park, B., Choi, H., Chang, T., Kang, K.: Period of Sequences of Primitive Polynomials. Electronics Letters 29(4), 390–391 (1993)CrossRefGoogle Scholar
  12. 12.
    Beker, H.J., Piper, F.C.: Secure Speech Communications. Academic Press, London (1985)Google Scholar
  13. 13.
    NIST, Announcing the Advanced Encryption Standard (AES), FIPS-197 (November 2001)Google Scholar
  14. 14.
    KISA, Development of SEED, the 128-bit block cipher standard, (October 1998), http://www.kisa.or.kr
  15. 15.
    Clark, A., Dawson, E., Fuller, J., Golić, J.D., Lee, H.-J., Millan, W.L., Moon, S.-J., Simpson, L.R.: The LILI-II keystream generator. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol. 2384, pp. 25–39. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  16. 16.
    Lee, H., Moon, S.: Parallel Stream Cipher for Secure High-Speed Communications. Signal Processing 82(2), 259–265 (2002)zbMATHCrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • HoonJae Lee
    • 1
  1. 1.Dongseo UniversityBusanKorea

Personalised recommendations