Design Analysis of an n-Bit LFSR-Based Generic Stream Cipher and Its Implementation Discussion on Hardware and Software
Pseudorandom numbers are at the core of any network security application. Also, security of satellite phones and cellular phones depends heavily on the pseudorandom numbers generated. In the network security domain, its use is particularly in key generati
- PDF / 866,382 Bytes
- 15 Pages / 439.37 x 666.142 pts Page_size
- 43 Downloads / 205 Views
Abstract Pseudorandom numbers are at the core of any network security application. Also, security of satellite phones and cellular phones depends heavily on the pseudorandom numbers generated. In the network security domain, its use is particularly in key generation, re-keying, authentication, smart-phone security, etc. Also, current research shows that satellite-based telephony system, having GMR-1 and GMR-2 algorithms for secret key generation is prone to attacks. The algorithm A5/1 used in GSM technology is also cryptographically poor. Hence generation of strong sets of pseudorandom number is needed. These random numbers are produced through a pseudorandom number generator (PRNG). This generator in general terms is called a Cipher. Hence, if there is a flaw or the PRNG produces predictable sets of random numbers, then the entire application would be prone to attacks. Therefore, development of a generic framework for generating strong sets of pseudorandom numbers is proposed. The proposal aims to build an in-general framework and a unified model for enhanced security specifically for LFSR-based stream ciphers. The proposed generic model uses results from the above case study. For the hardware deployment, Spartan-6 FPGA toolkit is used and for the software part a parallel computing platform namely CUDA is used. The model is aimed at development of a framework which generates strong sets of pseudorandom numbers for its use in various network security, satellite and cellular applications.
Keywords LFSR Parallel stream cipher CUDA Spartan-6 FPGA Cipher GSM GMR-1 GMR-2 A5/1 PRNG
Trishla Shah (&) Department of Computer Science and Engineering, B.H. Gardi College of Engineering and Technology, Rajkot 361162, India e-mail: [email protected] Darshana Upadhyay Institute of Technology, Nirma University, Ahmedabad 382481, India e-mail: [email protected] © Springer Science+Business Media Singapore 2016 S.C. Satapathy et al. (eds.), Proceedings of the International Congress on Information and Communication Technology, Advances in Intelligent Systems and Computing 439, DOI 10.1007/978-981-10-0755-2_64
607
608
Trishla Shah and Darshana Upadhyay
1 Introduction 1.1
Basic Concept
In current trends of security spectrum, LFSR-based stream ciphers form the backbone of critical security applications like military cryptography, encoding and higher order encryption mechanism. Recent research has open folds of attacks where these are most occurring like eavesdropping, snooping, masquerading, impersonation, and in the specific wireless network and telecommunications domain poor security mechanisms are explored. [1] Also, very critical applications like encryption scheme in military using GMR-1 and GMR-2 standards are prone to attacks. These LFSR-based stream ciphers currently are implemented on both hardware (A5/1, A5/2, KASUMA, E0, MICKEY, GRAIN, SNOW, FISH) and software (HC-256, Rabbit, Salsa20, SOSEMANUK) [2] platforms. These ciphers have been detected to be prone to various n
Data Loading...