### STUDIES ON STATISTICAL ANALYSIS AND PERFORMANCE EVALUATION FOR SOME STREAM CIPHERS

#### Abstract

#### Keywords

#### Full Text:

PDF#### References

N. Ferguson, B. Schneier, Practical Cryptography, John Wiley & Sons, 2003, 432 p.

A.J. Menezes, P.C. van Oorschot, S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997, 794 р.

The eSTREAM Project, 2004, [Online]. Available: http://www.ecrypt.eu.org

Cryptography Research and Evaluation Committees, CRYPTREC, 2005, [Online]. Available: http://www.cryptrec.go.jp

ISO/IEC 18033-3:2010. Information technology – Security techniques – Encryption algorithms – Part 3: Block ciphers, 2012. [Online]. Available: https://www.iso.org

ISO/IEC 18033-4:2011. Information technology – Security techniques – Encryption algorithms – Part 4: Stream ciphers, 2012. [Online]. Available: http://www.iso.org

ISO/IEC 29192-3:2012. Information technology-Security techniques-Lightweight cryptography-Part 3: Stream ciphers, [Online]. Available: https://www.iso.org

The eSTREAM Project – eSTREAM Phase 3. Grain (Portfolio Profile 2). [Online]. Available: http://www.ecrypt.eu.org

The eSTREAM Project - eSTREAM Phase 3. HC (Portfolio Profile 1). [Online]. Available: http://www.ecrypt.eu.org

The eSTREAM Project - eSTREAM Phase 3. MICKEY (Portfolio Profile 2). [Online]. Available: http://www.ecrypt.eu.org

The eSTREAM Project - eSTREAM Phase 3. Rabbit (Portfolio Profile 1). [Online]. Available: http://www.ecrypt.eu.org

The eSTREAM Project - eSTREAM Phase 3. Salsa20 (Portfolio Profile 1). [Online]. Available: http://www.ecrypt.eu.org

I. Gorbenko, O. Kuznetsov, Y. Gorbenko, A. Alekseychuk, V. Tymchenko, “Strumok keystream generator,” Proceedings of the 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), Kiev, 2018, pp. 294-299.

D. D. Ismoyo, R. W. Wardhani, “Block cipher and stream cipher algorithm performance comparison in a personal VPN gateway,” Proceedings of the 2016 International Seminar on Application for Technology of Information and Communication (ISemantic), Semarang, 2016, pp. 207-210.

I. Gorbenko, A. Kuznetsov, M. Lutsenko, D. Ivanenko, “The research of modern stream ciphers,” Proceedings of the 4th International Conference Problems of Infocommunications. Science and Technology (PIC S&T), Kharkiv, 2017, pp. 207-210.

D. Moody, “Post-quantum cryptography: NIST’s plan for the future,” Proceedings of the Seventh International Conference on Post Quantum Cryptography, Japan, 2016. [Online]. Available: https://pqcrypto2016.jp

The Marsaglia Random Number CDROM including the Diehard Battery of Tests of Randomness. [Online]. Available: http://stat.fsu.edu/pub/diehard

Special Publication 800-22. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. [Online]. Available: http://csrc.nist.gov

eSTREAM Optimized Code HOWTO, 2005. [Online]. Available: http://www.ecrypt.eu.org

A. Andrushkevych, Y. Gorbenko, O. Kuznetsov, R. Oliynykov, M. Rodinko, “Prospective lightweight block cipher for green IT engineering,” in: V. Kharchenko, Y. Kondratenko, J. Kacprzyk (eds) Green IT Engineering: Social, Business and Industrial Applications. Studies in Systems, Decision and Control, vol 171, Springer, Cham, 2019, pp. 95-112.

M. Robshaw, O. Billet, New stream cipher designs: The eSTREAM Finalists, Berlin, 2008.

O. Kuznetsov, O. Potii, A. Perepelitsyn, D. Ivanenko, N. Poluyanenko, “Lightweight stream ciphers for green IT engineering,” In: V. Kharchenko, Y. Kondratenko, J. Kacprzyk (eds) Green IT Engineering: Social, Business and Industrial Applications. Studies in Systems, Decision and Control, vol 171. Springer, Cham, 2019, pp. 113-137.

V.I. Dolgov, I.V.Lisitska, K.Ye. Lisitskyi, “The new concept of block symmetric ciphers design,” Telecommunications and Radio Engineering, vol. 76, issue 2, pp. 157-184, 2017.

A. A. Zadeh, H. M. Heys, “Application of simple power analysis to stream ciphers constructed using feedback shift registers,” The Computer Journal, vol. 58, no. 4, pp. 961-972, April 2015.

O. Potii, Y. Gorbenko, K. Isirova, “Post quantum hash based digital signatures comparative analysis. Features of their implementation and using in public key infrastructure,” Proceedings of the 2017 4th International Conference Problems of Infocommunications. Science and Technology (PIC S&T), Kharkov, 2017, pp. 105-109.

K. Lisickiy, V. Dolgov, I. Lisickaya, “Cipher with improved dynamic indicators of the condition of a random substitution,” Proceedings of the 2017 4th International Conference Problems of Infocommunications. Science and Technology (PIC S&T), Kharkov, 2017, pp. 396-399.

A. Vambol, V. Kharchenko, O. Potii, N. Bardis, “McEliece and Niederreiter cryptosystems analysis in the context of postquantum network security,” Proceedings of the 2017 Fourth International Conference on Mathematics and Computers in Sciences and in Industry (MCSI), Corfu, 2017, pp. 134-137.

A. Yanko, S. Koshman, V. Krasnobayev, “Algorithms of data processing in the residual classes system,” Proceedings of the 2017 4th International Conference Problems of Infocommunications. Science and Technology (PIC S&T), Kharkov, 2017, pp. 117-121.

C. Carlet et al., “Analysis of the algebraic side channel attack,” Journal of Cryptographic Engineering, vol. 1, no. 2, pp. 45-62, 2012.

V. Krasnobayev, A. Kuznetsov, S. Koshman, S. Moroz, “Improved method of determining the alternative set of numbers in residue number system,” In: O. Chertov, T. Mylovanov, Y. Kondratenko, J. Kacprzyk, V. Kreinovich, V. Stefanuk (eds) Recent Developments in Data Science and Intelligent Analysis of Information. ICDSIAI 2018. Advances in Intelligent Systems and Computing, vol. 836, Springer, Cham, 5 August 2018, pp. 319-328.

A. R. Kazmi, M. Afzal, M. F. Amjad, A. Rashdi, “Combining algebraic and side channel attacks on stream ciphers,” Proceedings of the 2017 International Conference on Communication Technologies (ComTech), Rawalpindi, 2017, pp. 138-142.

S. Rassomakhin, A. Kuznetsov, V. Shlokin, I. Belozertsev, R. Serhiienko, “Mathematical model for the probabilistic minutia distribution in biometric fingerprint images,” Proceedings of the 2018 IEEE Second International Conference on Data Stream Mining & Processing (DSMP), Lviv, Ukraine, 2018, pp. 514-518.

T. Grinenko, O. Nariezhnii, “The method of constructing the randomness extractor of a quantum random number generator on the basis of multimodulo transformation,” Proceedings of the 2017 4th International Conference Problems of Infocommunications. Science and Technology (PIC S&T), Kharkov, 2017, pp. 167-172.

D. P. Upadhyay, P. Sharma, S. Valiveti, “Randomness analysis of A5/1 Stream Cipher for secure mobile communication,” International Journal of Computer Science & Communication, vol. 3, pp. 95-100, 2014.

K. Isirova, O. Potii, “Decentralized public key infrastructure development principles,” Proceedings of the 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), Kiev, 2018, pp. 305-310.

D. Upadhyay, T. Shah, P. Sharma, “Cryptanalysis of hardware based stream ciphers and implementation of GSM stream cipher to propose a novel approach for designing n-bit LFSR stream cipher,” Proceedings of the 2015 19th International Symposium on VLSI Design and Test, Ahmedabad, 2015, pp. 1-6.

P. Pillai, S. Pote, “Physical layer security using stream cipher for LTE,” Proceedings of the 2015 IEEE Bombay Section Symposium (IBSS), Mumbai, 2015, pp. 1-5.

### Refbacks

- There are currently no refbacks.