Advertisement

Rabbit: A New High-Performance Stream Cipher

  • Martin Boesgaard
  • Mette Vesterager
  • Thomas Pedersen
  • Jesper Christiansen
  • Ove Scavenius
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2887)

Abstract

We present a new stream cipher, Rabbit, based on iterating a set of coupled non-linear functions. Rabbit is characterized by a high performance in software with a measured encryption/decryption speed of 3.7 clock cycles per byte on a Pentium III processor. We have performed detailed security analysis, in particular, correlation analysis and algebraic investigations. The cryptanalysis of Rabbit did not reveal an attack better than exhaustive key search.

Keywords

Stream cipher fast non-linear coupled counter chaos 

References

  1. 1.
    Wolfram, S.: Cryptography with Cellular Automata. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 429–432. Springer, Heidelberg (1986)Google Scholar
  2. 2.
    Jakimoski, G., Kocarev, L.: Chaos and Cryptography: Block Encryption Ciphers Based on Chaotic Maps. IEEE Transactions on Circuits and Systems-1: Fundamental Theory and Applications 48(2), 163–169 (2001)zbMATHCrossRefMathSciNetGoogle Scholar
  3. 3.
    Habutso, T., Nishio, Y., Sasase, I., Mori, S.: A secret key cryptosystem by iterating a chaotic map. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 127–140. Springer, Heidelberg (1991)Google Scholar
  4. 4.
    Biham, E.: Cryptoanalysis of the chaotic-map cryptosystem suggested at EUROCRYPT 1991. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 532–534. Springer, Heidelberg (1991)Google Scholar
  5. 5.
    Matthews, R.: On the Derivation of a “Chaotic” Encryption Algorithm. Cryptology XIII(1), 29–41 (1989)CrossRefMathSciNetGoogle Scholar
  6. 6.
    Yates, R.: Fixed-Point Arithmetic: An Introduction, http://personal.mia.bellsouth.net/lig/y/a/yatesc/fp.pdf
  7. 7.
    Menezes, A., Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press LLC, Boca Raton (1997)zbMATHGoogle Scholar
  8. 8.
    Shamir, A., Tsaban, B.: Guaranteeing the Diversity of Number Generators. Information and Computation 171(2), 350–363 (2001)zbMATHCrossRefMathSciNetGoogle Scholar
  9. 9.
    Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1994)Google Scholar
  10. 10.
    Rueppel, R.A.: Analysis and Design of Stream Ciphers. Springer, Berlin (1986)zbMATHGoogle Scholar
  11. 11.
    Daemen, J.: ch. 5: Propagation and Correlation. Annex to AES Proposal (1998)Google Scholar
  12. 12.
    A Statistical Test Suite for the Validation of Random Number Generators and Pseudo Random Number Generators for Cryptographic Applications, NIST Special Publication 800-22, National Institute of Standards and Technology (2001), http://csrc.nist.gov/rng
  13. 13.
    Masaglia, G.: A battery of tests for random number generators, Florida State University, http://stat.fsu.edu/geo/diehard.html
  14. 14.
    Walker, J.: A Pseudorandom Number Sequence Test Program, http://www.fourmilab.ch/random
  15. 15.
    Meier, W., Staffelbach, O.: Fast Correlation Attacks on Stream Ciphers. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 301–314. Springer, Heidelberg (1988)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Martin Boesgaard
    • 1
  • Mette Vesterager
    • 1
  • Thomas Pedersen
    • 1
  • Jesper Christiansen
    • 1
  • Ove Scavenius
    • 1
  1. 1.CRYPTICO A/SCopenhagenDenmark

Personalised recommendations