STUDIES ON STATISTICAL ANALYSIS AND PERFORMANCE EVALUATION FOR SOME STREAM CIPHERS
DOI:
https://doi.org/10.47839/ijc.18.1.1277Keywords:
stream cipher, encryption, pseudorandom sequence, statistical analysis, performance evaluation.Abstract
This paper presents the results of the comparative analysis of safety statistics and performance of encryption, the Strumok stream symmetric cipher (proposed for the national encryption standard of Ukraine) with other known cryptographic transformation algorithms, such as SALSA20, SNOW2.0, HC, AES with usages in stream mode, etc. They are accepted as national, international standards or are presented by the New European Schemes for Signatures, Integrity, and Encryptions (NESSI), Cryptography Research and Evaluation Committees (CRYPTREC) and others. The result of safety statistics is an analysis of the cryptographic properties of the output sequences using statistical test sets developed by the National Institute of Standards and Technology (NIST STS) and the DIEHARD tests. The result of the study of performance is the evaluation of the use of central processing unit (CPU) time to convert one octet of data to 64-bit computing platforms, following the test profile used in the eSTREAM contest.References
N. Ferguson, B. Schneier, Practical Cryptography, John Wiley & Sons, 2003, 432 p.
A.J. Menezes, P.C. van Oorschot, S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997, 794 р.
The eSTREAM Project, 2004, [Online]. Available: http://www.ecrypt.eu.org
Cryptography Research and Evaluation Committees, CRYPTREC, 2005, [Online]. Available: http://www.cryptrec.go.jp
ISO/IEC 18033-3:2010. Information technology – Security techniques – Encryption algorithms – Part 3: Block ciphers, 2012. [Online]. Available: https://www.iso.org
ISO/IEC 18033-4:2011. Information technology – Security techniques – Encryption algorithms – Part 4: Stream ciphers, 2012. [Online]. Available: http://www.iso.org
ISO/IEC 29192-3:2012. Information technology-Security techniques-Lightweight cryptography-Part 3: Stream ciphers, [Online]. Available: https://www.iso.org
The eSTREAM Project – eSTREAM Phase 3. Grain (Portfolio Profile 2). [Online]. Available: http://www.ecrypt.eu.org
The eSTREAM Project - eSTREAM Phase 3. HC (Portfolio Profile 1). [Online]. Available: http://www.ecrypt.eu.org
The eSTREAM Project - eSTREAM Phase 3. MICKEY (Portfolio Profile 2). [Online]. Available: http://www.ecrypt.eu.org
The eSTREAM Project - eSTREAM Phase 3. Rabbit (Portfolio Profile 1). [Online]. Available: http://www.ecrypt.eu.org
The eSTREAM Project - eSTREAM Phase 3. Salsa20 (Portfolio Profile 1). [Online]. Available: http://www.ecrypt.eu.org
I. Gorbenko, O. Kuznetsov, Y. Gorbenko, A. Alekseychuk, V. Tymchenko, “Strumok keystream generator,” Proceedings of the 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), Kiev, 2018, pp. 294-299.
D. D. Ismoyo, R. W. Wardhani, “Block cipher and stream cipher algorithm performance comparison in a personal VPN gateway,” Proceedings of the 2016 International Seminar on Application for Technology of Information and Communication (ISemantic), Semarang, 2016, pp. 207-210.
I. Gorbenko, A. Kuznetsov, M. Lutsenko, D. Ivanenko, “The research of modern stream ciphers,” Proceedings of the 4th International Conference Problems of Infocommunications. Science and Technology (PIC S&T), Kharkiv, 2017, pp. 207-210.
D. Moody, “Post-quantum cryptography: NIST’s plan for the future,” Proceedings of the Seventh International Conference on Post Quantum Cryptography, Japan, 2016. [Online]. Available: https://pqcrypto2016.jp
The Marsaglia Random Number CDROM including the Diehard Battery of Tests of Randomness. [Online]. Available: http://stat.fsu.edu/pub/diehard
Special Publication 800-22. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. [Online]. Available: http://csrc.nist.gov
eSTREAM Optimized Code HOWTO, 2005. [Online]. Available: http://www.ecrypt.eu.org
A. Andrushkevych, Y. Gorbenko, O. Kuznetsov, R. Oliynykov, M. Rodinko, “Prospective lightweight block cipher for green IT engineering,” in: V. Kharchenko, Y. Kondratenko, J. Kacprzyk (eds) Green IT Engineering: Social, Business and Industrial Applications. Studies in Systems, Decision and Control, vol 171, Springer, Cham, 2019, pp. 95-112.
M. Robshaw, O. Billet, New stream cipher designs: The eSTREAM Finalists, Berlin, 2008.
O. Kuznetsov, O. Potii, A. Perepelitsyn, D. Ivanenko, N. Poluyanenko, “Lightweight stream ciphers for green IT engineering,” In: V. Kharchenko, Y. Kondratenko, J. Kacprzyk (eds) Green IT Engineering: Social, Business and Industrial Applications. Studies in Systems, Decision and Control, vol 171. Springer, Cham, 2019, pp. 113-137.
V.I. Dolgov, I.V.Lisitska, K.Ye. Lisitskyi, “The new concept of block symmetric ciphers design,” Telecommunications and Radio Engineering, vol. 76, issue 2, pp. 157-184, 2017.
A. A. Zadeh, H. M. Heys, “Application of simple power analysis to stream ciphers constructed using feedback shift registers,” The Computer Journal, vol. 58, no. 4, pp. 961-972, April 2015.
O. Potii, Y. Gorbenko, K. Isirova, “Post quantum hash based digital signatures comparative analysis. Features of their implementation and using in public key infrastructure,” Proceedings of the 2017 4th International Conference Problems of Infocommunications. Science and Technology (PIC S&T), Kharkov, 2017, pp. 105-109.
K. Lisickiy, V. Dolgov, I. Lisickaya, “Cipher with improved dynamic indicators of the condition of a random substitution,” Proceedings of the 2017 4th International Conference Problems of Infocommunications. Science and Technology (PIC S&T), Kharkov, 2017, pp. 396-399.
A. Vambol, V. Kharchenko, O. Potii, N. Bardis, “McEliece and Niederreiter cryptosystems analysis in the context of postquantum network security,” Proceedings of the 2017 Fourth International Conference on Mathematics and Computers in Sciences and in Industry (MCSI), Corfu, 2017, pp. 134-137.
A. Yanko, S. Koshman, V. Krasnobayev, “Algorithms of data processing in the residual classes system,” Proceedings of the 2017 4th International Conference Problems of Infocommunications. Science and Technology (PIC S&T), Kharkov, 2017, pp. 117-121.
C. Carlet et al., “Analysis of the algebraic side channel attack,” Journal of Cryptographic Engineering, vol. 1, no. 2, pp. 45-62, 2012.
V. Krasnobayev, A. Kuznetsov, S. Koshman, S. Moroz, “Improved method of determining the alternative set of numbers in residue number system,” In: O. Chertov, T. Mylovanov, Y. Kondratenko, J. Kacprzyk, V. Kreinovich, V. Stefanuk (eds) Recent Developments in Data Science and Intelligent Analysis of Information. ICDSIAI 2018. Advances in Intelligent Systems and Computing, vol. 836, Springer, Cham, 5 August 2018, pp. 319-328.
A. R. Kazmi, M. Afzal, M. F. Amjad, A. Rashdi, “Combining algebraic and side channel attacks on stream ciphers,” Proceedings of the 2017 International Conference on Communication Technologies (ComTech), Rawalpindi, 2017, pp. 138-142.
S. Rassomakhin, A. Kuznetsov, V. Shlokin, I. Belozertsev, R. Serhiienko, “Mathematical model for the probabilistic minutia distribution in biometric fingerprint images,” Proceedings of the 2018 IEEE Second International Conference on Data Stream Mining & Processing (DSMP), Lviv, Ukraine, 2018, pp. 514-518.
T. Grinenko, O. Nariezhnii, “The method of constructing the randomness extractor of a quantum random number generator on the basis of multimodulo transformation,” Proceedings of the 2017 4th International Conference Problems of Infocommunications. Science and Technology (PIC S&T), Kharkov, 2017, pp. 167-172.
D. P. Upadhyay, P. Sharma, S. Valiveti, “Randomness analysis of A5/1 Stream Cipher for secure mobile communication,” International Journal of Computer Science & Communication, vol. 3, pp. 95-100, 2014.
K. Isirova, O. Potii, “Decentralized public key infrastructure development principles,” Proceedings of the 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), Kiev, 2018, pp. 305-310.
D. Upadhyay, T. Shah, P. Sharma, “Cryptanalysis of hardware based stream ciphers and implementation of GSM stream cipher to propose a novel approach for designing n-bit LFSR stream cipher,” Proceedings of the 2015 19th International Symposium on VLSI Design and Test, Ahmedabad, 2015, pp. 1-6.
P. Pillai, S. Pote, “Physical layer security using stream cipher for LTE,” Proceedings of the 2015 IEEE Bombay Section Symposium (IBSS), Mumbai, 2015, pp. 1-5.
Downloads
Published
How to Cite
Issue
Section
License
International Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.