A novel stream cipher with dynamic structure /
Stream ciphers are commonly used to provide confidentiality for a wide range of frame based applications such as mobile devices or embedded systems. For these applications, stream ciphers are preferred for encryption due to the simplicity of their implementation, efficiency and high throughput. Howe...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
Kuala Lumpur :
Kulliyyah of Information and Communication Technology, International Islamic University Malaysia,
2017
|
Subjects: | |
Online Access: | Click here to view 1st 24 pages of the thesis. Members can view fulltext at the specified PCs in the library. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 042550000a22002890004500 | ||
---|---|---|---|
008 | 170428s2017 my a f m 000 0 eng d | ||
040 | |a UIAM |b eng |e rda | ||
041 | |a eng | ||
043 | |a a-my--- | ||
050 | 0 | 0 | |a QA76.9.A25 |
100 | 1 | |a Eljadi, Fardous Mohamed Ali, |e author | |
245 | 1 | 2 | |a A novel stream cipher with dynamic structure / |c by Fardous Mohamed Ali Eljadi |
264 | 1 | |a Kuala Lumpur : |b Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, |c 2017 | |
300 | |a xvii, 124 leaves : |b illustrations ; |c 30cm. | ||
336 | |2 rdacontent |a text | ||
502 | |a Thesis (Ph.D)--International Islamic University Malaysia, 2017. | ||
504 | |a Includes bibliographical references (leaves 115-123). | ||
520 | |a Stream ciphers are commonly used to provide confidentiality for a wide range of frame based applications such as mobile devices or embedded systems. For these applications, stream ciphers are preferred for encryption due to the simplicity of their implementation, efficiency and high throughput. However, practical attacks have been discovered on well-known stream ciphers. Many stream ciphers are designed to resist these attacks. The majority of these ciphers has a fixed structure, which is an advantage that their security against the known attacks can be proved. However, the fixed building structure of these ciphers also provides opportunities for potential new attacks. There have been a few approaches that have tried to add dynamicity to the structure of these ciphers to improve their security level. The idea behind this is that when the structures of ciphers are unknown to attackers, they are more resistant to attacks. However, these ciphers are not widely discussed among researchers. Moreover, the existing research concerning stream ciphers with dynamic structures has focused mostly on dynamic polynomial switching in the Linear Feedback Shift Registers. This study proposes a novel dynamic structure stream cipher algorithm based on using a dynamic structure and some parameters to increase the complexity of the cipher, consequently, improving its security level. In the proposed cipher, the dynamic parameters are the number of registers, the length of the registers, the clocking system, the initialization procedure, the confusion and diffusion method, and the output function. These parameters are specified using bits from the secret key. The components of the proposed algorithm were tested using the NIST test suite in order to readjust them to improve the results. The NIST test suite was conducted for several keys. Afterward, fine tuning was conducted to enhance the statistical properties of the generated keystream. Then, performance and security analyses were conducted to evaluate the proposed algorithm. Furthermore, a comparison between the proposed algorithm and the seven winners of the eSTREAM competition in terms of the statistical properties was performed. The results showed that the proposed algorithm outperforms the compared ciphers in the linear complexity test. In addition to this, a performance comparison between the proposed algorithm and Mickey 128 was carried out. The result showed that the proposed algorithm is faster than Mickey 128, despite the fact that it has more dynamic parameters than Mickey 128. Therefore, the proposed algorithm is very promising for practical use. | ||
596 | |a 1 | ||
655 | 7 | |a Theses, IIUM local | |
690 | |a Dissertations, Academic |x Kulliyyah of Information and Communication Technology |z IIUM | ||
710 | 2 | |a International Islamic University Malaysia. |b Kulliyyah of Information and Communication Technology | |
856 | 4 | |u https://lib.iium.edu.my/mom/services/mom/document/getFile/wwlTjEp4yorsy5BxhQk1wxyIPdlrpnaK20171031101652532 |z Click here to view 1st 24 pages of the thesis. Members can view fulltext at the specified PCs in the library. | |
900 | |a sbh-aaz-ls | ||
999 | |c 436086 |d 468402 | ||
952 | |0 0 |6 T QA 000076.9 A25 E37N 2017 |7 0 |8 THESES |9 761680 |a IIUM |b IIUM |c MULTIMEDIA |g 0.00 |o t QA 76.9 A25 E37N 2017 |p 11100362061 |r 2018-08-10 |t 1 |v 0.00 |y THESIS | ||
952 | |0 0 |6 TS CDF QA 76.9 A25 E37N 2017 |7 0 |8 THESES |9 855786 |a IIUM |b IIUM |c MULTIMEDIA |g 0.00 |o ts cdf QA 76.9 A25 E37N 2017 |p 11100362062 |r 2018-08-10 |t 1 |v 0.00 |y THESISDIG |