Model design for a reduced variant of a Trivium Type Stream Cipher

Authors

  • Antonio Castro Lechtaler CriptoLab, EST, Instituto Universitario del Ejército, Buenos Aires, Argentina
  • Marcelo Cipriano CriptoLab, EST, Instituto Universitario del Ejército, Buenos Aires, Argentina
  • Edith García CriptoLab, EST, Instituto Universitario del Ejército, Buenos Aires, Argentina
  • Julio Liporace CriptoLab, EST, Instituto Universitario del Ejército, Buenos Aires, Argentina
  • Ariel Maiorano CriptoLab, EST, Instituto Universitario del Ejército, Buenos Aires, Argentina
  • Eduardo Malvacio CriptoLab, EST, Instituto Universitario del Ejército, Buenos Aires, Argentina

Keywords:

LFSR, NLSFR, Trivium, Bivium, Trivium-Toy, Bivium-Toy

Abstract

We analyze the family of stream ciphers N-viums: Trivium and Bivium. We present the Trivium algorithm and its variants. In particular, we study the NLFSRs used in these generators, their feedback functions and their combination. Two reduced variants of these models are presented, labeled Toys. Finally, we delve into the open problems ingrained in these cryptosystems.

Downloads

Download data is not yet available.

References

[1] De Canniére, C. and Preneel, B. “TRIVIUM A Stream Cipher Construction Inspired by Block Cipher Design Principles”. In Workshop on Stream Ciphers Revisited (SASC2006), 2006.
[2] De Canniére, C. and Preneel, B. “TRIVIUM Specifications”. eSTREAM, ECRYPT Stream Cipher Project, Report. 2008.
[3] Dubrova, E. “A List of Maximum-Period NLFSRs”, Cryptology ePrint Archive, Report 2012/166, March 2012, http://eprint.iacr.org/2012/166
[4] Dubrova, E. “A scalable method for constructing Galois NLFSRs with period 2n −1 using cross-join pairs”. Technical Report 2011/632, Cryptology ePrint Archive, November 2011. http://eprint.iacr.org/2011/632.
[5] eSTREAM: eSTREAM – The ECRYPT Stream Cipher Project: http://www.ecrypt.eu.org/stream/
[6] Golomb. “Shift Register Sequences”. Aegean Park Press, 1982.
[7] Massey, J.L. “Shift-register synthesis and BCH decoding”. IEEE Transactions on Information Theory 15, 1969.
[8] Maximov, A. and Biryukov, A. “Two Trivial Attacks on Trivium”, Selected Areas in Cryptography, Lecture Notes in Computer Science, Vol.4876, Springer, 2007.
[9] McDonald, C. and Pieprzyk, C. “Attacking Bivium with MiniSat”, Cryptology ePrint Archive,Report 2007/040, 2007.
[10] Raddum, H.“Cryptanalytic Results on Trivium”, eSTREAM, ECRYPT Stream Cipher Project, Report 2006/039, 2006.
[11] Yun Tian, Gongliang Chen, Jianhua Li: “On the Design of Trivium”. IACR Cryptology ePrint Archive 2009.

Downloads

Published

2014-04-01

How to Cite

Castro Lechtaler, A., Cipriano, M., García, E., Liporace, J., Maiorano, A., & Malvacio, E. (2014). Model design for a reduced variant of a Trivium Type Stream Cipher. Journal of Computer Science and Technology, 14(01), p. 55–58. Retrieved from https://journal.info.unlp.edu.ar/JCST/article/view/578

Issue

Section

Original Articles

Most read articles by the same author(s)