Abstract
Stream ciphers are essential tools for encrypting sensitive data. While having the limitation that a single key may never be used twice, they are often very fast and can offer a valuable alternative to block ciphers in many applications.
In this contribution we describe a novel stream cipher based on discrete Kolmogorov systems. Based on a theorem stating that discrete Kolmogorov systems can provide a perfect permutation operator, we develop a strong generator for pseudo-random bits or bytes. These bits or bytes are then added to the plaintext stream to produce the desired ciphertext stream in a straightforward manner.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Aigner, M.: Kombinatorik. Springer, Heidelberg (1975)
Arnold, V.I., Avez, A.: Ergodic Problems of Classical Mechanics. W.A. Benjamin, New York (1968)
Biryukov, A., Shamir, A., Wagner, D.: Real time cryptanalysis of A5/1 on a PC. In: Fast Software Encryption Workshop (2000)
Fluhrer, S.R., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm of RC4. In: Selected Areas in Cryptography, pp. 1–24 (2001)
Goldstein, S., Misra, B., Courbage, M.: On intrinsic randomness of dynamical systems. Journal of Statistical Physics 25(1), 111–126 (1981)
Moser, J.: Stable and Random Motions in Dynamical Systems. Princeton University Press, Princeton (1973)
NIST. Secure hash standard (SHS). FIPS 180-2 (August 2002)
Robshaw, M.J.B.: Stream ciphers. Technical report, RSA Laboratories (July 1995)
Scharinger, J.: An excellent permutation operator for cryptographic applications. In: Moreno DÃaz, R., Pichler, F., Quesada Arencibia, A. (eds.) EUROCAST 2005. LNCS, vol. 3643, pp. 317–326. Springer, Heidelberg (2005)
Schneier, B.: Applied Cryptography. Addison-Wesley, Reading (1996)
Shannon, C.E.: Communication theory of secure systems. Bell System Technical Journal 28(4), 656–715 (1949)
Shields, P.: The Theory of Bernoulli Shifts. The University of Chicago Press, Chicago (1973)
Tews, E., Weinmann, R.-P., Pyshkin, A.: Breaking 104 bit wep in less than 60 seconds. Cryptology ePrint Archive, Report 2007/120 (2007), http://eprint.iacr.org/
Xu, S.B., He, D.K., Wang, X.M.: An implementation of the GSM general data encryption algorithm A5. In: Chinacrypt 1994, pp. 287–291 (1994)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Scharinger, J. (2009). Kolmogorov Stream Ciphers. In: Moreno-DÃaz, R., Pichler, F., Quesada-Arencibia, A. (eds) Computer Aided Systems Theory - EUROCAST 2009. EUROCAST 2009. Lecture Notes in Computer Science, vol 5717. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04772-5_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-04772-5_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04771-8
Online ISBN: 978-3-642-04772-5
eBook Packages: Computer ScienceComputer Science (R0)