Kangaroo A Proposed Stream Cipher Algorithm

Stream cipher designers offer new algorithms by employing thecharacteristics of the basic structure to get algorithms that have advanced featuresfrom security and speed stand point of view. Taking into consideration the benefitfrom the scientific and technical development at the publish time of thei...

Full description

Bibliographic Details
Main Authors: Abdul-Monem S. Rahma, Suhad AbdulZahra Hassan Al-Quraishi
Format: Article
Language:English
Published: Unviversity of Technology- Iraq 2010-01-01
Series:Engineering and Technology Journal
Subjects:
Online Access:https://etj.uotechnology.edu.iq/article_26977_20451bce4592e7411c16f0522ca031c8.pdf
_version_ 1797325405825269760
author Abdul-Monem S. Rahma
Suhad AbdulZahra Hassan Al-Quraishi
author_facet Abdul-Monem S. Rahma
Suhad AbdulZahra Hassan Al-Quraishi
author_sort Abdul-Monem S. Rahma
collection DOAJ
description Stream cipher designers offer new algorithms by employing thecharacteristics of the basic structure to get algorithms that have advanced featuresfrom security and speed stand point of view. Taking into consideration the benefitfrom the scientific and technical development at the publish time of theiralgorithms versions. This research proposes the design of a new efficient andsecure stream cipher, named (Kangaroo) which was designed to be more securethan conventional stream cipher systems that use XOR for mixing. The proposedalgorithm encompasses two major components. The first part involves the PseudoRandom Number Generator (PRNG) using Rabbit algorithm. And the second partinvolves a nonlinear invertible round function (combiner) to perform theencryption and decryption processes. This will lead to strengthen the weak XORcombiner. The proposed cipher is not a random number generator alone. Instead itis self-synchronizing stream cipher such that - the cipher text influences its internalfunctioning. The proposed algorithm uses 16-bytes secret key to encrypt theplaintext which is multiple of 16-bytes up to (264 bytes) length. Also theperformance and memory requirements of the proposed system are evaluated. Suchthat the setup stage requires 1987 operations and the encryption/decryptionprocesses require 4 operations per byte. And the memory requirement is 344 bytes.The implementation was done on a (Pentium IV, 1.79 GHz, 224 MB of RAM) PC,Windows XP, using (Java Builder 7).
first_indexed 2024-03-08T06:09:02Z
format Article
id doaj.art-e685280d9146475499b9be98821af124
institution Directory Open Access Journal
issn 1681-6900
2412-0758
language English
last_indexed 2024-03-08T06:09:02Z
publishDate 2010-01-01
publisher Unviversity of Technology- Iraq
record_format Article
series Engineering and Technology Journal
spelling doaj.art-e685280d9146475499b9be98821af1242024-02-04T17:44:23ZengUnviversity of Technology- IraqEngineering and Technology Journal1681-69002412-07582010-01-0128353755110.30684/etj.28.3.1226977Kangaroo A Proposed Stream Cipher AlgorithmAbdul-Monem S. RahmaSuhad AbdulZahra Hassan Al-QuraishiStream cipher designers offer new algorithms by employing thecharacteristics of the basic structure to get algorithms that have advanced featuresfrom security and speed stand point of view. Taking into consideration the benefitfrom the scientific and technical development at the publish time of theiralgorithms versions. This research proposes the design of a new efficient andsecure stream cipher, named (Kangaroo) which was designed to be more securethan conventional stream cipher systems that use XOR for mixing. The proposedalgorithm encompasses two major components. The first part involves the PseudoRandom Number Generator (PRNG) using Rabbit algorithm. And the second partinvolves a nonlinear invertible round function (combiner) to perform theencryption and decryption processes. This will lead to strengthen the weak XORcombiner. The proposed cipher is not a random number generator alone. Instead itis self-synchronizing stream cipher such that - the cipher text influences its internalfunctioning. The proposed algorithm uses 16-bytes secret key to encrypt theplaintext which is multiple of 16-bytes up to (264 bytes) length. Also theperformance and memory requirements of the proposed system are evaluated. Suchthat the setup stage requires 1987 operations and the encryption/decryptionprocesses require 4 operations per byte. And the memory requirement is 344 bytes.The implementation was done on a (Pentium IV, 1.79 GHz, 224 MB of RAM) PC,Windows XP, using (Java Builder 7).https://etj.uotechnology.edu.iq/article_26977_20451bce4592e7411c16f0522ca031c8.pdfadditive stream cipheraes block cipher roundcombiner
spellingShingle Abdul-Monem S. Rahma
Suhad AbdulZahra Hassan Al-Quraishi
Kangaroo A Proposed Stream Cipher Algorithm
Engineering and Technology Journal
additive stream cipher
aes block cipher round
combiner
title Kangaroo A Proposed Stream Cipher Algorithm
title_full Kangaroo A Proposed Stream Cipher Algorithm
title_fullStr Kangaroo A Proposed Stream Cipher Algorithm
title_full_unstemmed Kangaroo A Proposed Stream Cipher Algorithm
title_short Kangaroo A Proposed Stream Cipher Algorithm
title_sort kangaroo a proposed stream cipher algorithm
topic additive stream cipher
aes block cipher round
combiner
url https://etj.uotechnology.edu.iq/article_26977_20451bce4592e7411c16f0522ca031c8.pdf
work_keys_str_mv AT abdulmonemsrahma kangarooaproposedstreamcipheralgorithm
AT suhadabdulzahrahassanalquraishi kangarooaproposedstreamcipheralgorithm