<p><p>This state-of-the-art survey presents the outcome of the eSTREAM Project, which was launched in 2004 as part of ECRYPT, the European Network of Excellence in Cryptology (EU Framework VI). </p><p>The goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on a
Analysis and Design of Stream Ciphers
β Scribed by Dr. Rainer A. Rueppel (auth.)
- Publisher
- Springer-Verlag Berlin Heidelberg
- Year
- 1986
- Tongue
- English
- Leaves
- 255
- Series
- Communications and Control Engineering Series
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
It is now a decade since the appearance of W. Diffie and M. E. Hellmann's startling paper, "New Directions in Cryptography". This paper not only established the new field of public-key cryptography but also awakened scientific interest in secret-key cryptography, a field that had been the almost exclusive domain of secret agencies and mathematical hobbyist. A number of exΒ cellent books on the science of cryptography have appeared since 1976. In the main, these books thoroughly treat both public-key systems and block ciphers (i. e. secret-key ciphers with no memoΒ ry in the enciphering transformation) but give short shrift to stream ciphers (i. e. , secret-key ciphers wi th memory in the enciphering transformation). Yet, stream ciphers, such as those . implemented by rotor machines, have played a dominant role in past cryptographic practice, and, as far as I can determine, reΒ main still the workhorses of commercial, military and diplomatic secrecy systems. My own research interest in stream ciphers found a natural reΒ sonance in one of my doctoral students at the Swiss Federal Institute of Technology in Zurich, Rainer A. Rueppe1. As Rainer was completing his dissertation in late 1984, the question arose as to where he should publish the many new results on stream ciphers that had sprung from his research.
β¦ Table of Contents
Front Matter....Pages I-XII
Introduction....Pages 1-4
Stream Ciphers....Pages 5-16
Algebraic Tools....Pages 17-30
Random Sequences and Linear Complexity....Pages 31-53
Nonlinear Theory of Periodic Sequences....Pages 54-141
Multiple Speed: An Additional Parameter in Secure Sequence Generation....Pages 142-162
The Knapsack as a Nonlinear Function....Pages 163-191
The Hard Knapsack Stream Cipher....Pages 192-208
Nonlinear Combining Functions with Memory....Pages 209-230
Back Matter....Pages 231-244
β¦ Subjects
Communications Engineering, Networks;Computer-Aided Engineering (CAD, CAE) and Design;Control, Robotics, Mechatronics
π SIMILAR VOLUMES
<p><p>This state-of-the-art survey presents the outcome of the eSTREAM Project, which was launched in 2004 as part of ECRYPT, the European Network of Excellence in Cryptology (EU Framework VI). </p><p>The goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on a
<p><p>This state-of-the-art survey presents the outcome of the eSTREAM Project, which was launched in 2004 as part of ECRYPT, the European Network of Excellence in Cryptology (EU Framework VI). </p><p>The goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on a
<div><div><div>This book provides the most complete description, analysis, and comparative studies of modern standardized and most common stream symmetric encryption algorithms, as well as stream modes of symmetric block ciphers. Stream ciphers provide an encryption in almost real-time regardless of
<span>This book provides the most complete description, analysis, and comparative studies of modern standardized and most common stream symmetric encryption algorithms, as well as stream modes of symmetric block ciphers. Stream ciphers provide an encryption in almost real-time regardless of the volu