Kangaroo A Proposed Stream Cipher Algorithm
Stream cipher designers offer new algorithms by employing thecharacteristics of the basic structure to get algorithms that have advanced featuresfrom security and speed stand point of view. Taking into consideration the benefitfrom the scientific and technical development at the publish time of thei...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Unviversity of Technology- Iraq
2010-01-01
|
Series: | Engineering and Technology Journal |
Subjects: | |
Online Access: | https://etj.uotechnology.edu.iq/article_26977_20451bce4592e7411c16f0522ca031c8.pdf |
_version_ | 1797325405825269760 |
---|---|
author | Abdul-Monem S. Rahma Suhad AbdulZahra Hassan Al-Quraishi |
author_facet | Abdul-Monem S. Rahma Suhad AbdulZahra Hassan Al-Quraishi |
author_sort | Abdul-Monem S. Rahma |
collection | DOAJ |
description | Stream cipher designers offer new algorithms by employing thecharacteristics of the basic structure to get algorithms that have advanced featuresfrom security and speed stand point of view. Taking into consideration the benefitfrom the scientific and technical development at the publish time of theiralgorithms versions. This research proposes the design of a new efficient andsecure stream cipher, named (Kangaroo) which was designed to be more securethan conventional stream cipher systems that use XOR for mixing. The proposedalgorithm encompasses two major components. The first part involves the PseudoRandom Number Generator (PRNG) using Rabbit algorithm. And the second partinvolves a nonlinear invertible round function (combiner) to perform theencryption and decryption processes. This will lead to strengthen the weak XORcombiner. The proposed cipher is not a random number generator alone. Instead itis self-synchronizing stream cipher such that - the cipher text influences its internalfunctioning. The proposed algorithm uses 16-bytes secret key to encrypt theplaintext which is multiple of 16-bytes up to (264 bytes) length. Also theperformance and memory requirements of the proposed system are evaluated. Suchthat the setup stage requires 1987 operations and the encryption/decryptionprocesses require 4 operations per byte. And the memory requirement is 344 bytes.The implementation was done on a (Pentium IV, 1.79 GHz, 224 MB of RAM) PC,Windows XP, using (Java Builder 7). |
first_indexed | 2024-03-08T06:09:02Z |
format | Article |
id | doaj.art-e685280d9146475499b9be98821af124 |
institution | Directory Open Access Journal |
issn | 1681-6900 2412-0758 |
language | English |
last_indexed | 2024-03-08T06:09:02Z |
publishDate | 2010-01-01 |
publisher | Unviversity of Technology- Iraq |
record_format | Article |
series | Engineering and Technology Journal |
spelling | doaj.art-e685280d9146475499b9be98821af1242024-02-04T17:44:23ZengUnviversity of Technology- IraqEngineering and Technology Journal1681-69002412-07582010-01-0128353755110.30684/etj.28.3.1226977Kangaroo A Proposed Stream Cipher AlgorithmAbdul-Monem S. RahmaSuhad AbdulZahra Hassan Al-QuraishiStream cipher designers offer new algorithms by employing thecharacteristics of the basic structure to get algorithms that have advanced featuresfrom security and speed stand point of view. Taking into consideration the benefitfrom the scientific and technical development at the publish time of theiralgorithms versions. This research proposes the design of a new efficient andsecure stream cipher, named (Kangaroo) which was designed to be more securethan conventional stream cipher systems that use XOR for mixing. The proposedalgorithm encompasses two major components. The first part involves the PseudoRandom Number Generator (PRNG) using Rabbit algorithm. And the second partinvolves a nonlinear invertible round function (combiner) to perform theencryption and decryption processes. This will lead to strengthen the weak XORcombiner. The proposed cipher is not a random number generator alone. Instead itis self-synchronizing stream cipher such that - the cipher text influences its internalfunctioning. The proposed algorithm uses 16-bytes secret key to encrypt theplaintext which is multiple of 16-bytes up to (264 bytes) length. Also theperformance and memory requirements of the proposed system are evaluated. Suchthat the setup stage requires 1987 operations and the encryption/decryptionprocesses require 4 operations per byte. And the memory requirement is 344 bytes.The implementation was done on a (Pentium IV, 1.79 GHz, 224 MB of RAM) PC,Windows XP, using (Java Builder 7).https://etj.uotechnology.edu.iq/article_26977_20451bce4592e7411c16f0522ca031c8.pdfadditive stream cipheraes block cipher roundcombiner |
spellingShingle | Abdul-Monem S. Rahma Suhad AbdulZahra Hassan Al-Quraishi Kangaroo A Proposed Stream Cipher Algorithm Engineering and Technology Journal additive stream cipher aes block cipher round combiner |
title | Kangaroo A Proposed Stream Cipher Algorithm |
title_full | Kangaroo A Proposed Stream Cipher Algorithm |
title_fullStr | Kangaroo A Proposed Stream Cipher Algorithm |
title_full_unstemmed | Kangaroo A Proposed Stream Cipher Algorithm |
title_short | Kangaroo A Proposed Stream Cipher Algorithm |
title_sort | kangaroo a proposed stream cipher algorithm |
topic | additive stream cipher aes block cipher round combiner |
url | https://etj.uotechnology.edu.iq/article_26977_20451bce4592e7411c16f0522ca031c8.pdf |
work_keys_str_mv | AT abdulmonemsrahma kangarooaproposedstreamcipheralgorithm AT suhadabdulzahrahassanalquraishi kangarooaproposedstreamcipheralgorithm |