Description
In this talk, we will sum up our recent research results concerning the introduction of a new representation for FCSRs and for LFSRs. This matrix based representation allows to construct LFSRs and FCSRs with a more compact hardware representation and a quicker diffusion while preserving the usual and proven good properties (good periods, $\ell$-sequences, good statistical behaviors, etc.). Moreover, this new approach circumvents the weaknesses of the Fibonacci and Galois representations of FCSRs. We also show how to extend the LFSRs representation to a particular LFSR case called the windmill case. LFSRs are well-known primitives used in cryptography especially for stream cipher design. However they have some drawbacks when looking at their resistance against algebraic attacks because of their linearity. In the contrary, FCSRs are inherently resistant to algebraic attacks due to the non-linearity of the update function. Using the new representation, we propose two new stream ciphers based on the so-called "ring" FCSR representation. The first proposal called F-FCSR is dedicated to hardware applications whereas the second proposal called X-FCSR is designed for software purposes but is also efficient in hardware.
Prochains exposés
-
Schéma de signature à clé publique : Frobénius-UOV
Orateur : Gilles Macario-Rat - Orange
L'exposé présente un schéma de signature à clé publique post-quantique inspiré du schéma UOV et introduisant un nouvel outil : les formes de Frobénius. L'accent est mis sur le rôle et les propriétés des formes de Frobénius dans ce nouveau schéma : la simplicité de description, la facilité de mise en oeuvre et le gain inédit sur les tailles de signature et de clé qui bat RSA-2048 au niveau de[…] -
Cryptanalysis of full BEANIE
Orateur : Xavier Bonnetain - Inria
BEANIE is a tweakable block cipher recently published at ToSC aiming for memory encryption of microcontroller units. In line with this goal, it handles small plaintexts of only 32 bits and has a low latency. In this paper, we propose the first third-party analysis of the two variants of BEANIE. By carefully leveraging structural properties of the cipher and taking advantage of its distinctive[…]-
Cryptography
-
Symmetrical primitive
-