Font Size: a A A

Design And Analysis Of Authenticated Encryption Algorithm Based On Streamcipher

Posted on:2018-01-15Degree:MasterType:Thesis
Country:ChinaCandidate:H Y SongFull Text:PDF
GTID:2348330518498667Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the launch of the CAESAR competition,authenticated encryption has become a popular research direction in symmetric cryptography.The encryption and decryption speed of stream ciphers is fast,the software implementation is simple,the hardware implementation is small,and stream ciphers are suitable for transmitting large amount of data.Similarly,authenticated encryption algorithms based on stream cipher have the same characteristics.In this paper,we pay attention to design and analysis of authenticated encryption algorithm based on stream cipher,and the main content is as follow:1.We introduce the concept of authenticated encryption and summarize its design principle.By comparing the traditional authenticated encryption and authenticated encryption in CAESAR competition,we find out that the authenticated encryption with authentication function and encryption function simultaneously is more secure and efficient,and the advantages of the authenticated encryption based on stream cipher are more prominent.Besides,according to the relationship between message and nonlinear state update function,we summarize the design method of stream ciphers.Then we introduce two typical authenticated encryption algorithms:FASER and MORUS.2.We study several attack methods of authenticated encryption algorithms based on stream cipher,namely,guess and determine attacks,algebraic attacks,linear distinguishing attacks,differential attacks and forgery attacks.Forgery attacks are mainly used for attacking the authentication part of an algorithm,the other four are mainly used for attacking the encryption part of an algorithm.Then we introduce the guess and determine attack on FASER128,and analyze MORUS by using linear distinguishing attack and forgery attack.3.We design an authenticated encryption algorithm based on stream cipher named BRIDGE,this algorithm uses three operations:additions modulo 232,XORs and rotations,and two functions:ARX and MIX,which provide good confusion and diffusion properties,respectively.4.We analyze the security of BRIDGE algorithm by two rounds of linear analysis,two rounds of chosen IV differential attack and collision forgery attack.The results show that the algorithm can resist these three attacks.By comparing the efficiency of BRIDGE and FASER128,we find that the implementation efficiency of BRIDGE is higher than FASER128's,and the speed of encryption is 12.15 cycles/byte when BRIDGE encrypts100,000 bytes data.
Keywords/Search Tags:authenticated encryption, stream cipher, ARX, linear analysis, differential attack
PDF Full Text Request
Related items