Analysis and Design of Stream Ciphers

It is now a decade since the appearance of W. Diffie and M. E. Hellmann's startling paper, "New Directions in Cryptography". This paper not only established the new field of public-key cryptography but also awakened scientific interest in secret-key crypt

  • PDF / 23,563,172 Bytes
  • 256 Pages / 481.89 x 691.654 pts Page_size
  • 68 Downloads / 333 Views

DOWNLOAD

REPORT


Rainer A. Rueppel

Analysis and Design of Stream Ciphers With 53 Figures

Springer-Verlag Berlin Heidelberg NewYork London Paris Tokyo

Dr. RAINER A. RUEPPEL Dept. of Electrical Engineering and Computer Science University of California, San Diego EECSC-014 La Jolla, CA 92093 USA

lSBN-13 :978-3-642-82867-6 e-lSBN-13:978-3-642-82865-2 DOl: 10.1007/978-3-642-82865-2 Library of Congress Cataloging in Publication Data. Rueppel, Rainer, Analysis and design of stream ciphers. (Communications and control engineering series) 1. Ciphers. 2. Cryptography. I. Title. II. Series. Z104.R83 1986 652'.8 86-17663 ISBN-13:978-3-642-82867-6 (U.S.) This work is subject to copyright All rights are reserved, whether the whole orpart ofthe material is concerned, specifically those oftranslation, reprinting, re-use ofillustrations, broadcasting, reproduction by photocopying machine or similar means, and storage in data banks. Under § 54 of the German Copyright Law where copies are made for other than private use, a fee is payable to "Verwertungsgesellschaft Wort", Munich.

© Springer-Verlag Berlin, Heidelberg 1986 Softcover reprint of the hardcover I st edition 1986 The use of registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific sratement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. 216113020-543210

Acknowledgments This book would not exist without Professor Jim Massey, my former thesis advisor at the Swiss Federal Institute of Technology in Zurich. Most of the research results presented here were developed during my time as research associate with Jim. Working wi th him provided both inspi ration and challenge at the same time. I can only hope that this book approaches the high standard of excellence exemplified by his own wor·k. I am indepted to Borer Electronics AG, Solothurn, Switzerland, supporting the preparation of this book. The cooperation originated in a joint project for the European Space Agency which was concerned about methods for encryption of spacecraft telemetry and telecommand links. Many of the new approaches presented here were inspired by the setup considered in this joint project. I wish to thank Hans-Peter Bader who worked with me on the ESA project for his thorough proof-reading of the manuscript. Special thanks are due to Karin Beyeler who efficiently mastered every hurdle in the preparation of the final manuscript, from deciphering my hand-writing, over fighting with text-processors and printers, to drawing the figures. I also wish to thank Othmar Staffelbach, currently with Gretag, Regensdorf, for his detailed comments and helpful suggestions concerning my doctoral thesis. Last but not least, I wish to thank my wife Ursula who was awai ting our fi rst baby during the time I wrote my doctoral thesis und who is presently awaiting our second baby, for her continuing support and understanding.

Foreword It is now a decade since the appearance of W. Diffie and M.E. Hellmann's startling paper, "N