Chapter4 2020
Chapter4 2020
Stream Ciphers
• Cryptographic systems
o Symmetrical key cryptographic systems
▪ Stream ciphers (to be covered in this chapter)
▪ Block ciphers
□ Classical ciphers (covered in Chapter 2)
□ Modern block ciphers (AES will be covered in Chapter 5)
Some figures are from W. Stalling’s book “Cryptography and network security”, 7th edition. ©2017 Pearson Education, Inc
• Module diagram: A 4-bit LFSR built with 4 one-bit registers and a mod 2
adder.
• Circuit diagram: The 4-bit LFSR implemented with 4 D flip-flops and one
XOR gate.
o Let the initial state be 0001. What is the output sequence? Find its
period.
• Output sequence:
o 0001 1110 1011 0010 0011 1101 0110 0100 …
• Developed in 1987.
• A5/1 is used for providing privacy for GSM cell phone.
• Estimated in 2011 that there were 4 billions GSM phones
installed with A5/1.
• A5/1 is still used in US and Europe.
• A5/2 was a weaker version for purpose of export.
• LFSR1:
x19 + x18 + x17 + x14 + 1
• LFSR2:
x22 + x21 + 1
• LFSR3:
x23 + x22 + x21 + x8 + 1
LFSR1
LFSR2
LFSR3
o MICKEY
▪ Use two 100-bit registers with irregular clocking circuitry
o Trivium
▪ Use a few long shift registers
• Let the 80-bit key and the l-bit initial vector are given as
K = (k0, k1, … , k79),
IV = (v0, v1, … , vl-1), 0 ≤ l ≤ 80, and
ki and vi each represents one bit.
• Initialize three vectors of lengths 93, 84, and 111, respectively: