Flexible Block Ciphers: Modifying LEX

被引:0
|
作者
Henricksen, Matt [1 ]
机构
[1] ASTAR, Inst Infocomm Res, Singapore, Singapore
关键词
cryptography; security; stream cipher; AES; LEX;
D O I
10.1109/ICCSIT.2010.5564740
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this paper, we review LEX, a stream cipher that harnesses the strength of the Advanced Encryption Standard (AES) block cipher to produce ciphertext at 2.5 times the speed of the AES. Both AES and LEX have been attacked due to the way that they convert master keys into round keys or state. We consider ways in which to remove the vulnerabilities of LEX without diminishing its throughput. We propose FLEX, a more secure version of LEX that produces keystream at 2.4 times the speed of the underlying block cipher.
引用
收藏
页码:630 / 634
页数:5
相关论文
共 50 条
  • [1] Flexible structures of lightweight block ciphers PRESENT, SIMON and LED
    Rashidi, Bahram
    IET CIRCUITS DEVICES & SYSTEMS, 2020, 14 (03) : 369 - 380
  • [2] Iterative Block Ciphers from Tweakable Block Ciphers with Long Tweaks
    Nakamichi, Ryota
    Iwata, Tetsu
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 2019 (04) : 54 - 80
  • [3] Tweakable Block Ciphers
    Liskov, Moses
    Rivest, Ronald L.
    Wagner, David
    JOURNAL OF CRYPTOLOGY, 2011, 24 (03) : 588 - 613
  • [4] Tweakable Block Ciphers
    Moses Liskov
    Ronald L. Rivest
    David Wagner
    Journal of Cryptology, 2011, 24 : 588 - 613
  • [5] Tweakable block ciphers
    Liskov, M
    Rivest, RL
    Wagner, D
    ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 31 - 46
  • [6] Block ciphers - A survey
    Knudsen, LR
    STATE OF THE ART IN APPLIED CRYPTOGRAPHY, 1998, 1528 : 18 - 48
  • [7] COMPARISON OF BLOCK CIPHERS
    GUSTAFSON, H
    DAWSON, E
    CAELLI, B
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 453 : 208 - 220
  • [8] The MESH block ciphers
    Nakahara, J
    Rijmen, V
    Preneel, B
    Vandewalle, J
    INFORMATION SECURITY APPLICATIONS, 2003, 2908 : 458 - 473
  • [9] Contemporary block ciphers
    Knudsen, LR
    LECTURES ON DATA SECURITY, 1999, 1561 : 105 - 126
  • [10] High-throughput and flexible ASIC implementations of SIMON and SPECK lightweight block ciphers
    Rashidi, Bahram
    INTERNATIONAL JOURNAL OF CIRCUIT THEORY AND APPLICATIONS, 2019, 47 (08) : 1254 - 1268