Browse > Article
http://dx.doi.org/10.9717/kmms.2011.14.6.759

MS64: A Fast Stream Cipher for Mobile Devices  

Kim, Yoon-Do (부경대학교 컴퓨터공학과)
Kim, Gil-Ho (부경대학교 IT융합응용공학과)
Cho, Gyeong-Yeon (부경대학교 IT융합응용공학과)
Seo, Kyung-Ryong (부경대학교 컴퓨터공학과)
Publication Information
Abstract
In this paper, we proposed fast stream cipher MS64 for use mobile that it is secure, fast, and easy to implement software. The proposed algorithm use the fast operating 213-bit arithmetic shift register(ASR) to generate a binary sequence and produce 64-bit stream cipher by using simple logical operation in non linear transform. MS64 supports 128-bit key in encryption algorithm and satisfy with the safety requirement in modern encryption algorithm. In simulation result shows that MS64 is faster than a 32-bit stream cipher SSC2 in the speed of operation with small usage of memory thus MS64 can be used for mobile devices with fast ciphering.
Keywords
ASR; Mobile; Stream Cipher;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 L. of the IEEE CS, "Wireless LAN medium access control(MAC) and physical layer (PHY) specifications," Technical Report, IEEE Standard 802.11, 1999.
2 http://www.ecrypt.eu.org/
3 박창수, 조경연, "갈로이 선형 궤환 레지스터의 일반화.", 전자 공학회 논문지 제43권 C1편 제1호 2006.
4 M. Walker and T. Wright, "GSM and UMTS: The creation of global mobile communication," John Wiley & Sons, pp.385-406, 2002.
5 B. Schneier, "Appled cryptography: Protocols, algorithms and source code in C," John Wiley & Sons, 1996.
6 FIPS PUB 197, Advanced Encryption Standard (AES), NIST, 2001.
7 D. J. Bernstein and P. Schwabe, "New AES Software Speed Records," INDOCRYPT 2008, LNCS Vol.5365, pp.322-336, 2008.
8 S. Contini, R. L. Rivest, M. J. B. Robshaw, and Y. L. Yin, "The Security of the RC6 Block Cipher," 1998.
9 C. Carroll, A. Chan, and M. Zhang "The software-oriented stream cipher SSC-II," FSE 2000, LNCS Vol.1978 pp.39-56 2000.
10 이준석, 장화식, 이경현, "셀룰러오토마타를 이용한 스트림 암호," 한국멀티미디어 학회 논문지, v.5, no.2, 2002.
11 A. Biryukov, A. Shamir and D. Wagner, "Real time cryptanalysis of A5/1 on a PC," Proceedings of Fast Software Encryption-FES, 2000.
12 D. J. Bernstein, Synchronous Stream Cipher Salsa20, http://www.ecrypt.eu.org/stream/ salsa20.html
13 김길호, 박창수, 김종남, 조경연, "소프트웨어 구현에 적합한 고속 스트림 암호 AA32", 한국통신학회논문지, 제35권 제6호, 2010. 6, pp.954-961
14 Y.L. Yin, "A Note on the Block Cipher Camellia," a contribution for ISO/IEC JTC1/ SC27, 2000.
15 ETSI. 3GPP TS 35.201. Specification of the 3GPP Confidentiality and Integrity Algorithms: Document 1: f8 and f9 Specification, 2002.
16 Bluetooth SIG. Specification of the Bluetooth System 2.0. http://www.bluetooth.com, 2005.
17 P. Hawkes, F. Quick and G. Roes, "A practical cryptanalysis of SSC2," Selected Areas in Cryptography LNCS, Vol.2259 pp.27-37, 2001.
18 P. Souradyuti and B. Preneel, "Analysis of Non-fortuitous RC4 key stream generator," Progress in Crytology-INDOCRYPT, 2003.