Advertisement

Turing: A Fast Stream Cipher

  • Gregory G. Rose
  • Philip Hawkes
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2887)

Abstract

This paper proposes the Turing stream cipher. Turing offers up to 256-bit key strength, and is designed for extremely efficient software implementation.It combines an LFSR generator based on that of SOBER [21] with a keyed mixing function reminiscent of a block cipher round. Aspects of the block mixer round have been derived from Rijndael [6], Twofish [23], tc24 [24] and SAFER++ [17].

Keywords

Block Cipher Initialization Vector Stream Cipher Linear Feedback Shift Register Input Word 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Blackburn, S., Murphy, S., Piper, F., Wild, P.: A SOBERing remark. Unpublished technical report, Information Security Group, Royal Holloway University of London, Egham, Surrey TW20 0EX, U.K (1998)Google Scholar
  2. 2.
    Bleichenbacher, D., Patel, S.: SOBER cryptanalysis. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 305–316. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  3. 3.
    Bleichenbacher, D., Patel, S., Meier, W.: Analysis of the SOBER stream cipher. TIA Contribution TR45.AHAG/99.08.30.12Google Scholar
  4. 4.
    Coppersmith, D., Halevi, S., Jutla, C.: Cryptanalysis of Stream Ciphers using Linear Masking. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 515–532. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  5. 5.
    Courtois, N.T.: Higher Order Correlatoin Attacks, XL algorithm and Cryptanalysis of Toyocrypt. Cryptology ePrint Archive, International Association for Cryptological Research (IACR), document 2002/087 (2002), See http://eprint.iacr.org
  6. 6.
    Daemen, J., Rijmen, V.: AES Proposal: Rijndael (2000), See http://www.esat.kuleuven.ac.be/~rijmen/rijndael
  7. 7.
    Dawson, E., Clark, A., Gustafson, H., May, L.: CRYPT-X 1998 (Java Version) User Manual. Queensland University of Technology (1999)Google Scholar
  8. 8.
    Dawson, E., Millan, W., Burnett, L., Carter, G.: On the Design of 8*32 S-boxes. Unpublished report, by the Information Systems Research Centre, Queensland University of Technology (1999)Google Scholar
  9. 9.
    Ekdahl, P., Johansson, T.: SNOW - a new stream cipher (2000), This paper is found in the NESSIE webpages: http://www.cosic.esat.kuleuven.ac.be/nessie/workshop/submissions/snow.zip
  10. 10.
    Golic, J.D.: On Security of Nonlinear Filter Generators. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 27–32. Springer, Heidelberg (1996)Google Scholar
  11. 11.
    Hall, C., Schneier, B.: An Analysis of SOBER (1999) (Unpublished report)Google Scholar
  12. 12.
    Hawkes, P., Rose, G.: Exploiting multiples of the connection polynomial in word-oriented stream ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 302–316. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  13. 13.
    Hawkes, P., Rose, G.: The t-class of SOBER stream ciphers (2000), See: http://people.qualcomm.com/ggr/QC/tclass.pdf
  14. 14.
    Hawkes, P., Rose, G.: Primitive specification and supporting documentation for SOBER-t32 submission to NESSIE (2000), See: http://www.cosic.esat.kuleuven.ac.be/nessie/workshop/submissions/sobert32.zip
  15. 15.
    Herlestam, T.: On functions of Linear Shift Register Sequences. In: Pichler, F. (ed.) EUROCRYPT 1985. LNCS, vol. 219, pp. 119–129. Springer, Heidelberg (1986)CrossRefGoogle Scholar
  16. 16.
    Massey, J.L.: SAFER K-64: A Byte-oriented Block-Ciphering Algorithm. In: Anderson, R. (ed.) FSE 1993. LNCS, vol. 809. Springer, Heidelberg (1994)Google Scholar
  17. 17.
    Massey, J., Khachatrian, G., Kuregian, M.: Nomination of SAFER++ as Candidate Algorithm for the New European Schemes for Signatures, Integrity, and Encryption (NESSIE) (September 2000), See: http://www.cosic.esat.kuleuven.ac.be/nessie/workshop/submissions/safer++.zip
  18. 18.
    Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. ch. 6. CRC Press, Boca Raton (1997)zbMATHGoogle Scholar
  19. 19.
    The NESSIE Project New European Schemes for Signatures, Integrity, and Encryption (2000-2003), See: http://www.cryptonessie.org
  20. 20.
    Paar, C.: Efficieint VLSI Architectures for Bit-Parallel Computation in Galois Fields. Ph.D. Thesis, Institute for Experimental Mathematics, University of Essen (1994) ISBN 3-18-332810-0Google Scholar
  21. 21.
    Rose, G.: A stream cipher based on Linear Feedback over GF(28). In: Boyd, C., Dawson, E. (eds.) ACISP 1998. LNCS, vol. 1438, pp. 146–155. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  22. 22.
    Rose, G.: Reference Source Code for Turing. QUALCOMM Australia (2002), See: http://people.qualcomm.com/ggr/QC/Turing.tgz
  23. 23.
    Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C., Ferguson, N.: Twofish: A 128-Bit Block Cipher. See: http://www.counterpane.com/twofish.html
  24. 24.
    St, T.: Denis. Weekend Cipher. sci.crypt news article: 3d4d614d_17@news.teranews.com Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Gregory G. Rose
    • 1
  • Philip Hawkes
    • 1
  1. 1.Qualcomm Australia, Level 3GladesvilleAustralia

Personalised recommendations