Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Advertisement

Springer Nature Link
Log in

TWOPRIME: A fast stream ciphering algorithm

  • Conference paper
  • First Online:

Part of the book series:Lecture Notes in Computer Science ((LNCS,volume 1267))

Included in the following conference series:

Abstract

In this paper, we describe an additive stream ciphering algorithm, called “TWOPRIME≓. It is designed for 32-bit computers, and the key has 128 bits. It is fast in software and analytical in the sense that some security aspects of the algorithm can be controlled. A faster version of TWOPRIME is also presented. We also describe a variant of TWOPRIME, called ONEPRIME, which is for 64-bit machines.

References

  1. R. J. Anderson,Searching for optimum correlation attacks, in Fast Software Encryption (B. Preneel, Ed.), LNCS 1008, 137–143.

    Google Scholar 

  2. C. Ding, G. Xiao and W. Shan,The Stability Theory of Stream Ciphers, LNCS 561, Springer-Verlag, 1991.

    Google Scholar 

  3. C. Ding,Binary cyclotomic generators, in Fast Software Encryption (B. Preneel, Ed.), LNCS 1008, 29–60.

    Google Scholar 

  4. J. L. Massey,Shift-register synthesis and BCH decoding, IEEE Trans. Inform. Theory, Vol. IT-15 (1969), 122–127.

    Article MathSciNet  Google Scholar 

  5. J. L. Massey,SAFER K-64: A byte-oriented block-ciphering algorithm, in Fast Software Encryption (R. Anderson, Ed.), LNCS 809, Springer-Verlag, 1–17.

    Google Scholar 

  6. V. Rijmen, J. Daemen, B. Preneel, and E. De Win,The cipher SHARK, in Fast Software Encryption (D. Gollmann Ed.), LNCS 1039, Springer-Verlag, 99–112.

    Google Scholar 

  7. J. A. Reeds, N. J. A. Sloane, Shift-register synthesis (modulo m), SIAM J. Comput. 14, No. 3 (1985), 505–513.

    Article MathSciNet MATH  Google Scholar 

  8. P. Rogaway and D. Coppersmith,A Software-Optimized Encryption Algorithm, in Fast Software Encryption (R. Anderson, Ed.), LNCS 809, Springer-Verlag, 1994, 56–63.

    Google Scholar 

  9. T. Siegenthaler,Decrypting a class of stream ciphers using ciphertext only, IEEE Trans. Computers, Vol. C-034 (1984), 81–85.

    Article  Google Scholar 

  10. T. Siegenthaler,Correlation-immunity of nonlinear combining functions for cryptographic applications, IEEE Trans. Information Theory, Vol. IT-30 (1984), 776–780.

    Article MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Turku Centre for Computer Science, Datacity 4th floor, 20520, Turku, Finland

    Cunsheng Ding

  2. Department of Mathematics & Statiscias, University of Vaasa, FIN-65101, Vaasa, Finland

    Valtteri Niemi

  3. Department of Mathematics, University of Turku, FIN-20014, Turku, Finland

    Ari Renvall & Arto Salomaa

Authors
  1. Cunsheng Ding

    You can also search for this author inPubMed Google Scholar

  2. Valtteri Niemi

    You can also search for this author inPubMed Google Scholar

  3. Ari Renvall

    You can also search for this author inPubMed Google Scholar

  4. Arto Salomaa

    You can also search for this author inPubMed Google Scholar

Editor information

Eli Biham

Rights and permissions

Copyright information

© 1997 Springer-Verlag

About this paper

Cite this paper

Ding, C., Niemi, V., Renvall, A., Salomaa, A. (1997). TWOPRIME: A fast stream ciphering algorithm. In: Biham, E. (eds) Fast Software Encryption. FSE 1997. Lecture Notes in Computer Science, vol 1267. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0052337

Download citation

Publish with us


[8]ページ先頭

©2009-2025 Movatter.jp