Abstract
Designing symmetric ciphers based on chaotic maps or cellular automata has a long but rarely successful history. In this paper, we examine some symmetric ciphers based on chaotic maps and cellular automata, and indicate how to reconcile design techniques for these primitives with current methodologies.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
eSTREAM PHASE 3 (September 2008), http://www.ecrypt.eu.org/stream/index.html
State of the Art Stream Ciphers (SASC) 2008 Workshop, Lausanne, Switzerland (February 2008), Special Workshop hosted by the ECRYPT Network of Excellence, http://www.ecrypt.eu.org/stvl/sasc2008/
Alvarez, G., Montoya, F., Romera, M., Pastor, G.: Cryptanalysis of an ergodic chaotic cipher. Physics Letters A 311, 172–179 (2003)
Bao, F.: Cryptanalysis of a Partially Known Cellular Automata Cryptosystem. IEEE Transactions on Computers 53(11), 1493–1497 (2004)
Baptista, M.S.: Cryptography with chaos. Phys. Lett. A 240(50) (1998), http://cmup.fc.up.pt/cmup/murilo.baptista/baptista_PLA1998.pdf
Bernstein, D.: The Salsa20 Family of Ciphers. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs: The eSTREAM Finalists. LNCS, vol. 4986, pp. 84–97. Springer, Heidelberg (2008)
Boesgaard, M., Vesterager, M., Pedersen, T., Christiansen, J., Scavenius, O.: Rabbit: a new high-performance stream cipher. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 325–344. Springer, Heidelberg (2003)
Cho, J.Y.: An improved estimate of the correlation of distinguisher for Dragon. In: SASC 2008 [2]. Special Workshop hosted by the ECRYPT Network of Excellence, pp. 11–20 (2008), http://www.ecrypt.eu.org/stvl/sasc2008/
Dawson, E., Gustafson, H., Henricksen, M.: Analysis of statistical flaws in the RC4 encryption algorithm. In: 19th British Combinatorics Conference, Bangor, Wales (2003)
ECRYPT eSTREAM. The eSTREAM Project - eSTREAM Phase 3 Performance Figures - Intel Pentium 4 (2008), http://www.ecrypt.eu.org/stream/phase3perf/2007a/pentium-4-a/
Fog, A.: Instruction tables. Lists of instruction latencies, throughputs and microoperation breakdowns for Intel and AMD CPU’s (2009), http://www.agner.org/optimize/instruction_tables.pdf
Hong, J., Sarkar, P.: New applications of time memory data tradeoffs. In: Roy, B.K. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 353–372. Springer, Heidelberg (2005)
Indesteege, S.: Practical Collisions for EnRUPT. In: 16th International Workshop on Fast Software Encryption, FSE 2009, Leuven, Belgium (February 2009)
Lu, Y., Wang, H., Ling, S.: Cryptanalysis of Rabbit. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 204–214. Springer, Heidelberg (2008)
Mironov, I. (Not So) Random Shuffles of RC4. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 304–319. Springer, Heidelberg (2002)
O’Neil, S.: EnRUPT First all-in-one symmetric cryptographic primitive. In: SASC 2008 - The State of the Art of Stream Ciphers. Special Workshop hosted by the ECRYPT Network of Excellence, Lausanne, Switzerland, February 13-14 [2], pp. 259–272., http://www.ecrypt.eu.org/stvl/sasc2008/
Paul, G., Rathi, S., Maitra, S.: On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key. Des. Codes Cryptography 49(1-3), 123–134 (2008)
Sarkar, P.: Hiji-bij-bij: A new stream cipher with a self-synchronizing mode of operation. In: Johansson, T., Maitra, S. (eds.) INDOCRYPT 2003. LNCS, vol. 2904, pp. 36–51. Springer, Heidelberg (2003)
Shannon, C.: Communication theory of secrecy systems. Bell System Technical Journal 28, 656–715 (1985)
Simpson, L.R., Henricksen, M.: Improved Cryptanalysis of MAG. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 64–75. Springer, Heidelberg (2006)
Vuckovac, R.: MAG My Array Generator (a new strategy for random number generation) (2005), http://www.ecrypt.eu.org/stream/ciphers/mag/mag.pdf
Wolfram, S.: Cryptography with cellular automata. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 429–432. Springer, Heidelberg (1985)
Wolfram, S.: A New Kind of Science. Wolfram Media (January 2002)
Zenner, E.: A Cache Timing Analysis of HC-256. In: Proceedings of 15th Annual Workshop on Selected Areas in Cryptography. LNCS, Springer, Heidelberg (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Henricksen, M. (2009). A Critique of Some Chaotic-Map and Cellular Automata-Based Stream Ciphers. In: Datta, A. (eds) Advances in Computer Science - ASIAN 2009. Information Security and Privacy. ASIAN 2009. Lecture Notes in Computer Science, vol 5913. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10622-4_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-10622-4_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-10621-7
Online ISBN: 978-3-642-10622-4
eBook Packages: Computer ScienceComputer Science (R0)