Stream Ciphers Analysis Methods

  • Dominic Bucerzan "Aurel Vlaicu" University of Arad Faculty of Exact Sciences Department of Mathematics-Informatics România, 310330 Arad, 2 Elena Dr˘agoi
  • Mihaela Crăciun "Aurel Vlaicu" University of Arad Faculty of Exact Sciences Department of Mathematics-Informatics România, 310330 Arad, 2 Elena Dr˘agoi
  • Violeta Chiș "Aurel Vlaicu" University of Arad Faculty of Exact Sciences Department of Mathematics-Informatics România, 310330 Arad, 2 Elena Dr˘agoi
  • Crina Rațiu DARAMEC srl, Arad România, Sofronea FN

Abstract

The purpose of this paper is to present and to discuss analysis methods applied in symmetric cryptography, especially on stream ciphers. The tests were made on some algorithms and also on the personal symmetric cryptographic algorithm, HENKOS, based on a pseudorandom number generator. The test confirms that the algorithm appears to be secure and fast. The paper describes first the main parts of the cryptosystem, its implementation and different analysis methods. The code is written in the C/C++ language. The software application and the tests applied were processed on a PC computer. The quality analysis presents the results of many classical statistical tests, comparing some algorithms based especially on pseudo random number generators. The tests use standard sequence of 12.5 MB resulted from some test generators. The main part of the work presents selected results for the most important statistical tests like: FIPS 1401, FIPS 1402 , ENT tests, Diehard battery of tests, NIST Statistical Test Suite. The final question is: are these tests enough to certifie the quality of a tested algorithm?

References

[1] Bucerzan D. and Gheorghiță M., HENKOS – A New Stream Cipher: Performance Analysis, WARTACRYPT '04 The 4th Central European Conference on Cryptology, Bedlewo, Poland, July 2004.

[2] Bucerzan D., A Cryptographic Algorithm Based on a Pseudorandom Number Generator, SYNASC'08, Timi¸soara, October 2008.

[3] Marsaglia G., Diehard Statistical Tests, http://stat.fsu.edu/pub/diehard/

[4] Matsumoto M., Saito M., Nishimura T. and Hagita M., CRYPTMT Stream Cipher Version 3, eSTREAM project, http://www.ecrypt.eu.org/stream/

[5] Schneier B., Applied Cryptography, J. Wiley & Sons Inc, (second edition), 1996.

[6] ***, eSTREAM, http://www.ecrypt.eu.org/stream/

[7] ***, NESSIE European Proiect, http://www.cosic.esat.kuleuven.be/nessie/

[8] ***, http://www.answers.com/topic/stream-cipher
Published
2010-11-01
How to Cite
BUCERZAN, Dominic et al. Stream Ciphers Analysis Methods. INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, [S.l.], v. 5, n. 4, p. 483-489, nov. 2010. ISSN 1841-9844. Available at: <http://univagora.ro/jour/index.php/ijccc/article/view/2506>. Date accessed: 05 july 2020. doi: https://doi.org/10.15837/ijccc.2010.4.2506.

Keywords

stream cipher, synchronous stream cipher, pseudorandom number generator (PRNG), performance analysis, statistical tests