Stream Ciphers Analysis Methods
AbstractThe purpose of this paper is to present and to discuss analysis methods applied in symmetric cryptography, especially on stream ciphers. The tests were made on some algorithms and also on the personal symmetric cryptographic algorithm, HENKOS, based on a pseudorandom number generator. The test confirms that the algorithm appears to be secure and fast. The paper describes first the main parts of the cryptosystem, its implementation and different analysis methods. The code is written in the C/C++ language. The software application and the tests applied were processed on a PC computer. The quality analysis presents the results of many classical statistical tests, comparing some algorithms based especially on pseudo random number generators. The tests use standard sequence of 12.5 MB resulted from some test generators. The main part of the work presents selected results for the most important statistical tests like: FIPS 1401, FIPS 1402 , ENT tests, Diehard battery of tests, NIST Statistical Test Suite. The final question is: are these tests enough to certifie the quality of a tested algorithm?
 Bucerzan D., A Cryptographic Algorithm Based on a Pseudorandom Number Generator, SYNASC'08, Timi¸soara, October 2008.
 Marsaglia G., Diehard Statistical Tests, http://stat.fsu.edu/pub/diehard/
 Matsumoto M., Saito M., Nishimura T. and Hagita M., CRYPTMT Stream Cipher Version 3, eSTREAM project, http://www.ecrypt.eu.org/stream/
 Schneier B., Applied Cryptography, J. Wiley & Sons Inc, (second edition), 1996.
 ***, eSTREAM, http://www.ecrypt.eu.org/stream/
 ***, NESSIE European Proiect, http://www.cosic.esat.kuleuven.be/nessie/
 ***, http://www.answers.com/topic/stream-cipher
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
ONLINE OPEN ACCES: Acces to full text of each article and each issue are allowed for free in respect of Attribution-NonCommercial 4.0 International (CC BY-NC 4.0.
You are free to:
-Share: copy and redistribute the material in any medium or format;
-Adapt: remix, transform, and build upon the material.
The licensor cannot revoke these freedoms as long as you follow the license terms.
DISCLAIMER: The author(s) of each article appearing in International Journal of Computers Communications & Control is/are solely responsible for the content thereof; the publication of an article shall not constitute or be deemed to constitute any representation by the Editors or Agora University Press that the data presented therein are original, correct or sufficient to support the conclusions reached or that the experiment design or methodology is adequate.