Abstract
SSC2 is a fast software stream cipher designed for wireless handsets with limited computational capabilities. It supports various private key sizes from 4 bytes to 16 bytes. All operations in SSC2 are word-oriented, no complex operations such as multiplication, division, and exponentiation are involved. SSC2 has a very compact structure that makes it easy to implement on 8-,16-, and 32-bit processors. Theoretical analysis demonstrates that the keystream sequences generated by SSC2 have long period, large linear complexity, and good statistical distribution.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
R. P. Brent,“On the periods of generalized Fibonacci recurrences”, Mathematics of Computation, vol. 63, pp. 389–401, 1994.
T. M. Cover and Y. A. Thomas, Elements of Information Theory, John Wiley, 1991.
R. Forre, “A fast correlation attack on nonlinearly feedforward filtered shift register sequences”, Advances in Cryptology-Proceedings of EUROCRYPT’89 (LNCS 434), 586–595, 1990.
F. James, “A review of pseudo-random number generators”, Computer Physics Communications, vol. 60, pp. 329–344, 1990.
E. L. Key, “An analysis of the structure and complexity of nonlinear binary sequence generators”, IEEE Transactions on Infor. Theory, vol. 22, Nov. 1976.
D. E. Knuth, The Art of Computer programming. Volume 2: Seminumerical Algorithms, 3rd Edition, Addison-Wesley, 1997.
G. Marsaglia, “A current view of random number generators”, Computer Science and Statistics: Proc. 16th Symposium on the Interface, Elsvier Science Publishers B. V. (North-Holland), 1985.
W. Meier and O. Staffelbach, “Fast correlation attacks on stream ciphers”, Journal of Cryptology, vol. 1,no.3, 159–176, 1989.
FIPS 180, “Secure hash standard”, Federal Information Processing Standard Publication 180, April, 1995.
M.J.B. Robshow, “Stream ciphers”, Technical Report TR-701 (version 2.0), RSA Laboratories, 1995.
R. Rueppel, “Stream Ciphers” in Contemporary Cryptology: The Science of Information Integrity, G.J. Simmons, ed., IEEE Press, 1992, pp. 65–134.
R. Rueppel, Analysis and Design of Stream Ciphers, Springer-Verlag, Berlin, 1986.
B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley & Sons, New York, 2nd edition, 1996.
T. Siegenthaler, “Decrypting a class of stream ciphers using ciphertext only”, IEEE Transactions on Computing, vol. 34, 1985, 81–85.
T. Siegenthaler, “Cryptanalyst’s representation of nonlinearity filtered ml-sequences”, Advances in Cryptology-Proceedings of Eurocrypt’85 (LNCS), Springer-Verlag, 1986.
A. Biryukov and A. Shamir, “Real time cryptanalysis of the alleged A5/1 on a PC”, in this Proceedinds.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, M., Carroll, C., Chan, A. (2001). The Software-Oriented Stream Cipher SSC2. In: Goos, G., Hartmanis, J., van Leeuwen, J., Schneier, B. (eds) Fast Software Encryption. FSE 2000. Lecture Notes in Computer Science, vol 1978. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44706-7_3
Download citation
DOI: https://doi.org/10.1007/3-540-44706-7_3
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41728-6
Online ISBN: 978-3-540-44706-1
eBook Packages: Springer Book Archive