Abstract
Stream ciphers are essential tools for encrypting sensitive data. While having the limitation that a single key may never be used twice, they are often very fast and can offer a valuable alternative to block ciphers in many applications.
In this contribution we describe a novel stream cipher based on discrete Kolmogorov systems. Based on a theorem stating that discrete Kolmogorov systems can provide a perfect permutation operator, we develop a strong generator for pseudo-random bits or bytes. These bits or bytes are then added to the plaintext stream to produce the desired ciphertext stream in a straightforward manner.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Aigner, M.: Kombinatorik. Springer, Heidelberg (1975)
Arnold, V.I., Avez, A.: Ergodic Problems of Classical Mechanics. W.A. Benjamin, New York (1968)
Biryukov, A., Shamir, A., Wagner, D.: Real time cryptanalysis of A5/1 on a PC. In: Fast Software Encryption Workshop (2000)
Fluhrer, S.R., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm of RC4. In: Selected Areas in Cryptography, pp. 1–24 (2001)
Goldstein, S., Misra, B., Courbage, M.: On intrinsic randomness of dynamical systems. Journal of Statistical Physics 25(1), 111–126 (1981)
Moser, J.: Stable and Random Motions in Dynamical Systems. Princeton University Press, Princeton (1973)
NIST. Secure hash standard (SHS). FIPS 180-2 (August 2002)
Robshaw, M.J.B.: Stream ciphers. Technical report, RSA Laboratories (July 1995)
Scharinger, J.: An excellent permutation operator for cryptographic applications. In: Moreno DÃaz, R., Pichler, F., Quesada Arencibia, A. (eds.) EUROCAST 2005. LNCS, vol. 3643, pp. 317–326. Springer, Heidelberg (2005)
Schneier, B.: Applied Cryptography. Addison-Wesley, Reading (1996)
Shannon, C.E.: Communication theory of secure systems. Bell System Technical Journal 28(4), 656–715 (1949)
Shields, P.: The Theory of Bernoulli Shifts. The University of Chicago Press, Chicago (1973)
Tews, E., Weinmann, R.-P., Pyshkin, A.: Breaking 104 bit wep in less than 60 seconds. Cryptology ePrint Archive, Report 2007/120 (2007), http://eprint.iacr.org/
Xu, S.B., He, D.K., Wang, X.M.: An implementation of the GSM general data encryption algorithm A5. In: Chinacrypt 1994, pp. 287–291 (1994)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Scharinger, J. (2009). Kolmogorov Stream Ciphers. In: Moreno-DÃaz, R., Pichler, F., Quesada-Arencibia, A. (eds) Computer Aided Systems Theory - EUROCAST 2009. EUROCAST 2009. Lecture Notes in Computer Science, vol 5717. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04772-5_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-04772-5_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04771-8
Online ISBN: 978-3-642-04772-5
eBook Packages: Computer ScienceComputer Science (R0)