Advertisement

The Rabbit Stream Cipher

  • Martin Boesgaard
  • Mette Vesterager
  • Erik Zenner
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4986)

Abstract

The stream cipher Rabbit was first presented at FSE 2003 [3], and no attacks against it have been published until now. With a measured encryption/decryption speed of 3.7 clock cycles per byte on a Pentium III processor, Rabbit does also provide very high performance. This paper gives a concise description of the Rabbit design and some of the cryptanalytic results available.

Keywords

Stream cipher fast non-linear coupled counter 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Armknecht, F., Krause, M.: Algebraic attacks on combiners with memory. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 162–175. Springer, Heidelberg (2003)Google Scholar
  2. 2.
    Aumasson, J.-P.: On a bias of Rabbit. In: Proc. SASC (2007), http://www.ecrypt.eu.org/stream/papersdir/2007/033.pdf
  3. 3.
    Boesgaard, M., Vesterager, M., Pedersen, T., Christiansen, J., Scavenius, O.: Rabbit: A new high-performance stream cipher. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 307–329. Springer, Heidelberg (2003)Google Scholar
  4. 4.
    Courtois, N.: Fast algebraic attacks on stream ciphers with linear feedback. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 176–194. Springer, Heidelberg (2003)Google Scholar
  5. 5.
    Courtois, N.: Higher order correlation attacks, XL algorithm and cryptoanalysis of toyocrypt. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 182–199. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  6. 6.
    Courtois, N., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 345–359. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  7. 7.
    Courtois, N., Pieprzyk, J.: Cryptanalysis of block ciphers with overdefined systems of equations. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 267–287. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  8. 8.
    Cryptico A/S. Algebraic analysis of Rabbit. white paper (2003), http://www.cryptico.com
  9. 9.
    Cryptico A/S. Differential properties of the g-function. white paper (2003), http://www.cryptico.com
  10. 10.
    Cryptico A/S. Security analysis of the IV-setup for Rabbit. white paper (2003), http://www.cryptico.com
  11. 11.
    Daemen, J.: Cipher and hash function design strategies based on linear and differential cryptanalysis. PhD thesis, KU Leuven (March 1995)Google Scholar
  12. 12.
    Masaglia, G.: A battery of tests for random number generators (1996), http://stat.fsu.edu/~geo/diehard.html
  13. 13.
    Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1994)Google Scholar
  14. 14.
    Meier, W., Staffelbach, O.: Fast correlation attacks on stream ciphers. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 301–314. Springer, Heidelberg (1988)Google Scholar
  15. 15.
    National Institute of Standards and Technology. A statistical test suite for the validation of random number generators and pseudo random number generators for cryptographic applications. NIST Special Publication 800–822 (2001), http://csrc.nist.gov/rng
  16. 16.
    Rijmen, V.: Analysis of Rabbit (September 2003), http://www.cryptico.com/Files/filer/security_report.pdf
  17. 17.
    Rueppel, R.: Analysis and Design of Stream Ciphers. Springer, Heidelberg (1986)zbMATHGoogle Scholar
  18. 18.
    Scavenius, O., Boesgaard, M., Pedersen, T., Christiansen, J., Rijmen, V.: Periodic properties of counter assisted stream cipher. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 39–53. Springer, Heidelberg (2004)Google Scholar
  19. 19.
    Shamir, A., Tsaban, B.: Guaranteeing the diversity of number generators. Information and Computation 171(2), 350–363 (2001)zbMATHCrossRefMathSciNetGoogle Scholar
  20. 20.
    Walker, J.: A pseudorandom number sequence test program (1998), http://www.fourmilab.ch/random

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Martin Boesgaard
    • 1
  • Mette Vesterager
    • 1
  • Erik Zenner
    • 2
  1. 1.Cryptico A/S, Email: info@cryptico.com 
  2. 2.Technical University of Denmark 

Personalised recommendations