“Strumok” stream cipher
Abstract
This work presents the main developing results of a new keystream generator, which named “Strumok”, and offered as a candidate for the national symmetric encryption standard of Ukraine. “Strumok” is built on SNOW 2.0-likes schema of the summation generator. Increased secret key length and the initialization vector allow using reliably the stream cipher even taking into account quantum cryptographic analysis methods. Unlike SNOW 2.0, Strumok is designed for use in more powerful 64-bit computing systems. The conducted comparative tests have shown that the “Strumok” on 32-bit computing systems also shows good performance results. There are basic transformation and individual results from the cipher performance research, here is it is shown the generator, which is capable of forming a keystream at speeds exceed of 10 Gbit per sec.
Downloads
References
N. Ferguson and B. Schneier. Practical Cryptography. John Wiley & Sons, 2003, 432 p.
A.J. Menezes, P.C. van Oorschot, S.A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1997, 794 р.
N. Koblitz and A.J. Menezes. “A Riddle Wrapped in an Enigma”. Internet: https://eprint.iacr.org/2015/1018.pdf, Oct. 20, 2015 [Aug. 21, 2016]
D. Bernstein, J. Buchmann and E.Dahmen. Post-Quantum Cryptography. Springer-Verlag, Berlin-Heidleberg, 2009, 245 p.
D. Moody. “Post-Quntum Cryptography: NIST’s Plan for the Future”. The Seventh International Conference on Post-Quntum Cryptography, Japan, 2016. [On-line]. Internet: https://pqcrypto2016.jp/data/pqc2016_nist_announcement.pdf
ISO/IEC 18033-4:2011. “Information technology – Security techniques – Encryption algorithms – Part 4: Stream ciphers”. On-line]. Internet: http://www.iso.org/iso/home/store/catalogue_ics/catalogue_detail_ics.htm?csnumber=54532 [Dec., 2012]
O. Kuznetsov, M. Lutsenko and D. Ivanenko, "Strumok stream cipher: Specification and basic properties". 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T), Kharkiv, 2016, pp. 59-62.
O. Kuznetsov, Y. Gorbenko and I. Kolovanova, "Combinatorial properties of block symmetric ciphers key schedule". 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T), Kharkiv, 2016, pp. 55-58.
I. Gorbenko, A. Kuznetsov, M. Lutsenko and D. Ivanenko, "The research of modern stream ciphers". 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T), Kharkiv, 2017, pp. 207-210.
A. Kuznetsov, I. Svatovskij, N. Kiyan and A. Pushkar'ov, "Code-based public-key cryptosystems for the post-quantum period". 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T), Kharkiv, 2017, pp. 125-130.
A. Kuznetsov, I. Kolovanova and T. Kuznetsova, "Periodic characteristics of output feedback encryption mode". 2017 4th Inter-national Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T), Kharkiv, 2017, pp. 193-198.
A. Kuznetsov, Y. Gorbenko, A. Andrushkevych and I. Belozersev, "Analysis of block symmetric algorithms from international standard of lightweight cryptography ISO/IEC 29192-2". 2017 4th International Scientific-Practical Conference Problems of In-focommunications. Science and Technology (PIC S&T), Kharkiv, 2017, pp. 203-206.
Y. Izbenko, V. Kovtun and A. Kuznetsov, "The Design of Boolean Functions by Modified Hill Climbing Method". 2009 6th International Conference on Information Technology: New Generations, Las Vegas, NV, 2009, pp. 356-361.
A. Kuznetsov, R. Serhiienko and D. Prokopovych-Tkachenko, "Construction of cascade codes in the frequency domain". 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T), Kharkiv, 2017, pp. 131-136.
A. Andrushkevych, T. Kuznetsova, I. Bilozertsev and S. Bohucharskyi, "The block symmetric ciphers in the post-quantum peri-od". 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T), Kharkiv, 2016, pp. 43-46.
I.D. Gorbenko, V.I. Dolgov, V.I. Rublinetskii, K.V. Korovkin. “Methods of Information Protection in Communications Systems and Methods of Their Cryptoanalysis”. Telecommunications and Radio Engineering, Vol. 52, Issue 4, (1998), pp. 89-96.
I. Gorbenko, V. Ponomar. “Examining a possibility to use and the benefits of post-quantum algorithms dependent on the condi-tions of their application”. EasternEuropean Journal of Enterprise Technologies, Vol. 2, No. 9 (86) (2017), pp. 21-32.
Yu.V. Stasev, A.A. Kuznetsov. “Asymmetric code-theoretical schemes constructed with the use of algebraic geometric codes”. Kibernetika i Sistemnyi Analiz, No. 3, pp. 47-57, May-June 2005.
DSTU 7624:2014. “Informacijni tehnologii'. Kryptografichnyj zahyst informacii'. Algorytm symetrychnogo blokovogo peretvorennja”. (in Ukrainian). [On-line]. Internet: http://shop.uas.org.ua/ua/informacijni-tehnologii-kriptografichnij-zahist-informacii-algoritm-simetrichnogo-blokovogo-peretvorennja.html
“eSTREAM Optimized Code HOWTO”. [On-line]. Internet: http://www.ecrypt.eu.org/stream/perf/ [Nov. 1, 2005].