Advertisement

Trivium

  • Christophe De Cannière
  • Bart Preneel
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4986)

Abstract

In this chapter, we propose a new stream cipher construction based on block cipher design principles. The main idea is to replace the building blocks used in block ciphers by equivalent stream cipher components. In order to illustrate this approach, we construct a very simple synchronous stream cipher which provides a lot of flexibility for hardware implementations, and seems to have a number of desirable cryptographic properties.

Keywords

Block Cipher Linear Characteristic Stream Cipher Branch Number Algebraic Immunity 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Daemen, J.: Cipher and hash function design. Strategies based on linear and differential cryptanalysis. PhD thesis, Katholieke Universiteit Leuven (1995)Google Scholar
  2. 2.
    Hawkes, P., Rose, G.G.: Primitive specification and supporting documentation for SOBER-tw submission to NESSIE. In: Proceedings of the First NESSIE Workshop, NESSIE (2000)Google Scholar
  3. 3.
    Ekdahl, P., Johansson, T.: SNOW – A new stream cipher. In: Proceedings of the First NESSIE Workshop, NESSIE (2000)Google Scholar
  4. 4.
    Daemen, J., Clapp, C.S.K.: Fast hashing and stream encryption with PANAMA. In: Vaudenay, S. (ed.) FSE 1998. LNCS, vol. 1372, pp. 60–74. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  5. 5.
    Daemen, J., Rijmen, V.: The Design of Rijndael: AES — The Advanced Encryption Standard. Springer, Heidelberg (2002)zbMATHGoogle Scholar
  6. 6.
    Rosenthal, J., Smarandache, R.: Maximum distance separable convolutional codes. Applicable Algebra in Engineering, Communication and Computing 10(1), 15–32 (1999)zbMATHCrossRefMathSciNetGoogle Scholar
  7. 7.
    Bernstein, D.J.: Re: A reformulation of TRIVIUM. Posted on the eSTREAM Forum (2006), http://www.ecrypt.eu.org/stream/phorum/read.php?1,448
  8. 8.
    Khazaei, S.: Re: A reformulation of TRIVIUM. Posted on the eSTREAM Forum (2006), http://www.ecrypt.eu.org/stream/phorum/read.php?1,448
  9. 9.
    Maximov, A., Biryukov, A.: Two trivial attacks on Trivium. eSTREAM, ECRYPT Stream Cipher Project, Report 2007/003 (2007), http://www.ecrypt.eu.org/stream
  10. 10.
    Raddum, H.: Cryptanalytic results on TRIVIUM. eSTREAM, ECRYPT Stream Cipher Project, Report 2006/039 (2006), http://www.ecrypt.eu.org/stream
  11. 11.
    Courtois, N.T., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 345–359. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  12. 12.
    McDonald, C., Charnes, C., Pieprzyk, J.: Attacking Bivium with MiniSat. eSTREAM, ECRYPT Stream Cipher Project, Report 2007/040 (2007), http://www.ecrypt.eu.org/stream
  13. 13.
    Fischer, S., Meier, W.: Algebraic immunity of S-boxes and augmented functions. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 366–381. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  14. 14.
    Turan, M.S., Kara, O.: Linear approximations for 2-round Trivium. eSTREAM, ECRYPT Stream Cipher Project, Report 2007/008 (2007), http://www.ecrypt.eu.org/stream
  15. 15.
    Vielhaber, M.: Breaking ONE.FIVIUM by AIDA an algebraic IV differential attack. Cryptology ePrint Archive, Report 2007/413 (2007), http://eprint.iacr.org/
  16. 16.
    Fischer, S., Khazaei, S., Meier, W.: Key recovery with probabilistic neutral bits. Presented at the Echternach Symmetric Cryptography Seminar (2008)Google Scholar
  17. 17.
    Good, T., Benaissa, M.: Hardware results for selected stream cipher candidates. eSTREAM, ECRYPT Stream Cipher Project, Report 2007/023 (2007), http://www.ecrypt.eu.org/stream
  18. 18.
    Lano, J., Mentens, N., Preneel, B., Verbauwhede, I.: Power analysis of synchronous stream ciphers with resynchronization mechanism. In: ECRYPT Workshop, SASC – The State of the Art of Stream Ciphers, pp. 327–333 (2004)Google Scholar
  19. 19.
    Gürkaynak, F.K., Luethi, P., Bernold, N., Blattmann, R., Goode, V., Marghitola, M., Kaeslin, H., Felber, N., Fichtner, W.: Hardware evaluation of eSTREAM candidates: Achterbahn, Grain, MICKEY, MOSQUITO, SFINKS, TRIVIUM, VEST, ZK-Crypt. eSTREAM, ECRYPT Stream Cipher Project, Report 2006/015 (2006), http://www.ecrypt.eu.org/stream
  20. 20.
    Gaj, K., Southern, G., Bachimanchi, R.: Comparison of hardware performance of selected Phase II eSTREAM candidates. eSTREAM, ECRYPT Stream Cipher Project, Report 2007/027 (2007), http://www.ecrypt.eu.org/stream
  21. 21.
    Bulens, P., Kalach, K., Standaert, F.X., Quisquater, J.J.: FPGA implementations of eSTREAM Phase-2 focus candidates with hardware profile. eSTREAM, ECRYPT Stream Cipher Project, Report 2006/024 (2007), http://www.ecrypt.eu.org/stream
  22. 22.
    Good, T., Chelton, W., Benaissa, M.: Review of stream cipher candidates from a low resource hardware perspective. eSTREAM, ECRYPT Stream Cipher Project, Report 2006/016 (2006), http://www.ecrypt.eu.org/stream
  23. 23.
    Rogawski, M.: Hardware evaluation of eSTREAM candidates: Grain, Lex, Mickey128, Salsa20 and Trivium. eSTREAM, ECRYPT Stream Cipher Project, Report 2007/025 (2007), http://www.ecrypt.eu.org/stream
  24. 24.
    Feldhofer, M.: Comparison of low-power implementations of Trivium and Grain. eSTREAM, ECRYPT Stream Cipher Project, Report 2007/027 (2007), http://www.ecrypt.eu.org/stream

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Christophe De Cannière
    • 1
    • 2
  • Bart Preneel
    • 1
  1. 1.Dept. ESAT/SCD-COSIC and IBBTKatholieke Universiteit LeuvenHeverleeBelgium
  2. 2.Département d’Informatique École Normale Supérieure Paris cedex 05 

Personalised recommendations