Skip to main content

A Critique of Some Chaotic-Map and Cellular Automata-Based Stream Ciphers

  • Conference paper
Advances in Computer Science - ASIAN 2009. Information Security and Privacy (ASIAN 2009)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5913))

Included in the following conference series:

Abstract

Designing symmetric ciphers based on chaotic maps or cellular automata has a long but rarely successful history. In this paper, we examine some symmetric ciphers based on chaotic maps and cellular automata, and indicate how to reconcile design techniques for these primitives with current methodologies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. eSTREAM PHASE 3 (September 2008), http://www.ecrypt.eu.org/stream/index.html

  2. State of the Art Stream Ciphers (SASC) 2008 Workshop, Lausanne, Switzerland (February 2008), Special Workshop hosted by the ECRYPT Network of Excellence, http://www.ecrypt.eu.org/stvl/sasc2008/

  3. Alvarez, G., Montoya, F., Romera, M., Pastor, G.: Cryptanalysis of an ergodic chaotic cipher. Physics Letters A 311, 172–179 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  4. Bao, F.: Cryptanalysis of a Partially Known Cellular Automata Cryptosystem. IEEE Transactions on Computers 53(11), 1493–1497 (2004)

    Article  Google Scholar 

  5. Baptista, M.S.: Cryptography with chaos. Phys. Lett. A 240(50) (1998), http://cmup.fc.up.pt/cmup/murilo.baptista/baptista_PLA1998.pdf

  6. Bernstein, D.: The Salsa20 Family of Ciphers. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs: The eSTREAM Finalists. LNCS, vol. 4986, pp. 84–97. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  7. Boesgaard, M., Vesterager, M., Pedersen, T., Christiansen, J., Scavenius, O.: Rabbit: a new high-performance stream cipher. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 325–344. Springer, Heidelberg (2003)

    Google Scholar 

  8. Cho, J.Y.: An improved estimate of the correlation of distinguisher for Dragon. In: SASC 2008 [2]. Special Workshop hosted by the ECRYPT Network of Excellence, pp. 11–20 (2008), http://www.ecrypt.eu.org/stvl/sasc2008/

  9. Dawson, E., Gustafson, H., Henricksen, M.: Analysis of statistical flaws in the RC4 encryption algorithm. In: 19th British Combinatorics Conference, Bangor, Wales (2003)

    Google Scholar 

  10. ECRYPT eSTREAM. The eSTREAM Project - eSTREAM Phase 3 Performance Figures - Intel Pentium 4 (2008), http://www.ecrypt.eu.org/stream/phase3perf/2007a/pentium-4-a/

  11. Fog, A.: Instruction tables. Lists of instruction latencies, throughputs and microoperation breakdowns for Intel and AMD CPU’s (2009), http://www.agner.org/optimize/instruction_tables.pdf

  12. Hong, J., Sarkar, P.: New applications of time memory data tradeoffs. In: Roy, B.K. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 353–372. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  13. Indesteege, S.: Practical Collisions for EnRUPT. In: 16th International Workshop on Fast Software Encryption, FSE 2009, Leuven, Belgium (February 2009)

    Google Scholar 

  14. Lu, Y., Wang, H., Ling, S.: Cryptanalysis of Rabbit. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 204–214. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  15. Mironov, I. (Not So) Random Shuffles of RC4. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 304–319. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  16. O’Neil, S.: EnRUPT First all-in-one symmetric cryptographic primitive. In: SASC 2008 - The State of the Art of Stream Ciphers. Special Workshop hosted by the ECRYPT Network of Excellence, Lausanne, Switzerland, February 13-14 [2], pp. 259–272., http://www.ecrypt.eu.org/stvl/sasc2008/

  17. Paul, G., Rathi, S., Maitra, S.: On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key. Des. Codes Cryptography 49(1-3), 123–134 (2008)

    Article  MathSciNet  Google Scholar 

  18. Sarkar, P.: Hiji-bij-bij: A new stream cipher with a self-synchronizing mode of operation. In: Johansson, T., Maitra, S. (eds.) INDOCRYPT 2003. LNCS, vol. 2904, pp. 36–51. Springer, Heidelberg (2003)

    Google Scholar 

  19. Shannon, C.: Communication theory of secrecy systems. Bell System Technical Journal 28, 656–715 (1985)

    MathSciNet  Google Scholar 

  20. Simpson, L.R., Henricksen, M.: Improved Cryptanalysis of MAG. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 64–75. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  21. Vuckovac, R.: MAG My Array Generator (a new strategy for random number generation) (2005), http://www.ecrypt.eu.org/stream/ciphers/mag/mag.pdf

  22. Wolfram, S.: Cryptography with cellular automata. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 429–432. Springer, Heidelberg (1985)

    Google Scholar 

  23. Wolfram, S.: A New Kind of Science. Wolfram Media (January 2002)

    Google Scholar 

  24. Zenner, E.: A Cache Timing Analysis of HC-256. In: Proceedings of 15th Annual Workshop on Selected Areas in Cryptography. LNCS, Springer, Heidelberg (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Henricksen, M. (2009). A Critique of Some Chaotic-Map and Cellular Automata-Based Stream Ciphers. In: Datta, A. (eds) Advances in Computer Science - ASIAN 2009. Information Security and Privacy. ASIAN 2009. Lecture Notes in Computer Science, vol 5913. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10622-4_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10622-4_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10621-7

  • Online ISBN: 978-3-642-10622-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics