Bilgilendirme: Sürüm Güncellemesi ve versiyon yükseltmesi nedeniyle, geçici süreyle zaman zaman kesintiler yaşanabilir ve veri içeriğinde değişkenlikler gözlemlenebilir. Göstereceğiniz anlayış için teşekkür ederiz.
 

A New Construction Method for Keystream Generators

No Thumbnail Available

Date

2023

Journal Title

Journal ISSN

Volume Title

Publisher

IEEE

Open Access Color

OpenAIRE Downloads

OpenAIRE Views

Research Projects

Organizational Units

Organizational Unit
Organizational Unit

Journal Issue

Abstract

We introduce a new construction method of diffusion layers for Substitution Permutation Network (SPN) structures along with its security proofs. The new method can be used in block ciphers, stream ciphers, hash functions, and sponge constructions. Moreover, we define a new stream cipher mode of operation through a fixed pseudorandom permutation and provide its security proofs in the indistinguishability model. We refer to a stream cipher as a Small Internal State Stream (SISS) cipher if its internal state size is less than twice its key size. There are not many studies about how to design and analyze SISS ciphers due to the criterion on the internal state sizes, resulting from the classical tradeoff attacks. We utilize our new mode and diffusion layer construction to design an SISS cipher having two versions, which we call DIZY. We further provide security analyses and hardware implementations of DIZY. In terms of area cost, power, and energy consumption, the hardware performance is among the best when compared to some prominent stream ciphers, especially for frame-based encryptions that need frequent initialization. Unlike recent SISS ciphers such as Sprout, Plantlet, LILLE, and Fruit; DIZY does not have a keyed update function, enabling efficient key changing. © 2005-2012 IEEE.

Description

Keywords

Block cipher, Diffusion layers, Keystream, Lightweight ciphers, Stream ciphers, Tradeoff attacks

Turkish CoHE Thesis Center URL

Fields of Science

Citation

WoS Q

Q1

Scopus Q

Q1
OpenCitations Logo
OpenCitations Citation Count
2

Source

IEEE Transactions on Information Forensics and Security

Volume

18

Issue

Start Page

3735

End Page

3744
SCOPUS™ Citations

3

checked on Sep 11, 2025

Web of Science™ Citations

4

checked on Sep 11, 2025

Page Views

169

checked on Sep 11, 2025

Downloads

115

checked on Sep 11, 2025

Google Scholar Logo
Google Scholar™
OpenAlex Logo
OpenAlex FWCI
0.444

Sustainable Development Goals

SDG data is not available