스트림 암호의 발전 방향

  • 염용진 (국가보안기술연구소) ;
  • 홍진 (국가보안기술연구소) ;
  • 지성택 (국가보안기술연구소)
  • Published : 2005.01.30

Abstract

Keywords

References

  1. AES, 'Advanced encryption algorithm (AES) development effort,' 1997-2000. http://csrc.nist.gov/encryption/aes/
  2. SEED, 'SEED 블록 암호 알고리즘'. http://www.kisa.or.kr/seed/seed_kor.html
  3. ARIA, '민관겸용 블록 암호 알고리즘 ARIA' http://www.nsri.re.kr/ARIA/
  4. 강주성 외, '현대암호학', 경문사, 2000
  5. B. SIG, 'Bluetooth specification,' Technical Report, http://www.bluetooth.com
  6. I. Mironov, '(Not So) Random Shuffles of RC4', Advances in Cryptology - CRYPTO 2002
  7. P. Souradyuti, B. Preneel, 'Analysis of Non-fortuitous RC4 key stream generator, Progress in Cryptology - INDOCRYPT 2003
  8. L. of the IEEE CS, 'Wireless LAN medium access control (MAC) and physical layer (PHY) specifications,' Technical Report, IEEE Standard 802.11, 1999
  9. A. Biryukov, A. Shamir, D. Wagner, 'Realtime cryptanalysis of A5/1 on a PC,' Proceedings of Fast Software Encryption - FSE 2000
  10. G. O. Partners, 'Specification of the 3GPP confidentiality and integrity algorithm: Kasumi algorithm specification - 3GPP TS 35.202,' Technical Report, http://www.Sgpp. org, 2000
  11. NESSIE Project - New European Schemes for Signature, Integrity, and Encryption. http://cryptonessie.org/
  12. CRYPTREC Project - Cryptography Research & Evaluation Committehttp://www.ipa.go.jp/security/enc/CRYFIREC
  13. V. V. Chepyzhov, T. Johansson, and B. Smeets, 'A Simple algorithm for fast correlation attacks on stream ciphers,' Proceedings of Fast Software Encryption-FSE 2000
  14. P. Chose, A. Joux, M. Mitton, 'Fast correlation attacks :An algorithmic point of view,' Advances in Cryptology-EUROCRYPT 2002
  15. C. Canniere, J. Lano, P. Preneel, J. Vanderwalle, 'Distinguishing attacks on Sober-t32,' Proceedings of the 3rd NESSIE Workshop, 2002
  16. P. Hawkes, G. Rose, 'On the applicability of distinguishing attacks against stream ciphers,' Proceedings of the 3rd NESSIE Workshop, 2002
  17. N. T. Courtois, W. Meier, 'Algebraic attacks on stream ciphers with linear feedback,' Advances in Cryptology - EURO-CRYPT 2003
  18. A. Klimov, A. Shamir, 'A new class of invertible mappings,' Proceedings of CHES 2002
  19. ECRYPT Project - European Network of Excellence in Cryptology. http://www.ecrypt.eu.org/
  20. A. Shamir, 'Stream ciphers:Dead or Alive,' invited lecture at SASC 2004
  21. S. Babbage, 'Stream ciphers: What does the industry want?,' Proceedings of SASC 2004
  22. A. Biryukov, 'Block ciphers and stream ciphers: the state of the art,' IACR ePrint Archive 2004/094, 2004