Abstract
We present a new keystream generator (KSG) MUGI, which is a variant of Panama proposed at FSE ’98. MUGI has a 128-bit secret key and a 128-bit initial vector as parameters and generates a 64-bit string per round. The design is particularly suited for efficient hardware implementations, but the software performance of MUGI is excellent as well. A speed optimized implementation in hardware achieves about 3 Gbps with 26 Kgates, which is several times faster than AES. On the other hand the security was evaluated according to re-synchronization attack, related-key attack, and linear correlation of an output sequence. Our analysis confirms that MUGI is a secure KSG.
Chapter PDF
Similar content being viewed by others
References
E. Biham, A. Shamir, “Differential Cryptanalysis of the Data Encryption Standard,” Springer-Verlag, 1993
A. Clark, J. Golic, W. Millan, L. Penna, L. Simpson, “The LILI-128 Keystream Generator,” NESSIE project submission, 2000, available at http://www.cryptonessie.org.
P. Crowley, S. Lucks, “Bias in the LEVIATHAN Stream Cipher,” Fast Software Encryption, FSE 2001, Proceedings, pp. 223–230, 2001.
J. Daemen, “Cipher and hash function design strategies based on linear and differential cryptanalysis,” Doctoral Dissertation, March 1995, K. U. Leuven.
J. Daemen, C. Clapp, “Fast Hashing and Stream Encryption with Panama,” Fast Software Encryption, FSE’98, Springer-Verlag, LNCS 1372, pp. 60–74, 1998.
J. Daemen, R. Govaerts, J. Vandewalle, “Resynchronization weaknesses in synchronous stream ciphers,” Advances in Cryptology, Proceedings Eurocrypt’93, Springer-Verlag, LNCS 765, pp. 159–169, 1994.
J. Daemen, L. Knudsen, V. Rijmen, “The Block Cipher Square,” Fast Software Encryption, Springer-Verlag, LNCS 1267, pp. 149–165, 1997.
J. Daemen, V. Rijmen, “AES Proposal: Rijndael,” AES algorithm submission, September 3, 1999, available at http://www.nist.gov/aes/.
S. Fluhrer, “Cryptanalysis of the SEAL 3.0 Pseudorandom Function Family,” Fast Software Encryption, FSE 2001, Proceedings, pp. 142–151, 2001.
S. Fluhrer, M. Shamir, “Weaknesses in the Key Scheduling Algorithm of RC4,” Selected in Areas in Cryptography, SAC 2001, Springer-Verlag, LNCS 2259, pp. 1–24, 2001.
S. Furuya, D. Watanabe, K. Takaragi, “Self-Evaluation Report MULTI-S01,” 2000, available at http://www.sdl.hitachi.co.jp/crypto/s01/index.html
T. Jacobsen and L. R. Knudsen, “The Interpolation Attack on Block Ciphers,” Fast Software Encryption, FSE’97, Springer-Verlag, LNCS 1267, pp. 28–40, 1997.
L. R. Knudsen, “Truncated and Higher Order Differentials,” Fast Software Encryption, FSE’94, Springer-Verlag, LNCS 1008, pp. 196–211, 1995.
M. Matsui, “Linear cryptanalysis method for DES cipher,” Advances in Cryptology, Eurocrypt’93, Springer-Verlag, LNCS 765, pp. 159–169, 1994.
D. McGrew, S. Fluhrer, “The stream cipher LEVIATHAN,” NESSIE project submission, 2000, available at http://www.cryptonessie.org/.
M. Mihaljevic, M. Fossorier, H. Imai, “Fast Correlation Attack Algorithm with List Decoding and an Application,” Fast Software Encryption, FSE 2001, Proceedings, pp. 208–222, 2001.
P. Rogaway, D. Coppersmith, “A Software-Optimized Encryption Algorithm,” Fast Software Encryption, FSE’94, Springer-Verlag, LNCS 809, pp. 56–63, 1994.
P. Rogaway, D. Coppersmith, “A Software-Optimized Encryption Algorithm,” Journal fo Cryptography, Vol. 11, No. 4, pp. 273–287, 1998.
V. Rijmen, B. Van Rompay, B. Preneel, J. Vandewalle, “Producing Collisions for PANAMA,” Fast Software Encryption, FSE 2001, proceedings, pp. 39–53, 2001.
B. Schneier, Applied Cryptography, Second Edition, John Wiley & Sons, pp. 397–398, 1996.
B. Schneier, J. Kelsey, “Unbalanced Feistel Networks and Block Cipher Design,” Fast Software Encryption, FSE’96, Springer-Verlag, LNCS 1039, pp. 121–144, 1996.
D. Watanabe, S. Furuya, H. Yoshida, K. Takaragi, MUGI Pseudorandom number generator, Specification, 2001, available at http://www.sdl.hitachi.co.jp/crypto/mugi/index-e.html.
D. Watanabe, S. Furuya, H. Yoshida, K. Takaragi, MUGI Pseudorandom number generator, Self Evaluation, 2001, available at http://www.sdl.hitachi.co.jp/crypto/mugi/index-e.html.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Watanabe, D., Furuya, S., Yoshida, H., Takaragi, K., Preneel, B. (2002). A New Keystream Generator MUGI. In: Daemen, J., Rijmen, V. (eds) Fast Software Encryption. FSE 2002. Lecture Notes in Computer Science, vol 2365. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45661-9_14
Download citation
DOI: https://doi.org/10.1007/3-540-45661-9_14
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44009-3
Online ISBN: 978-3-540-45661-2
eBook Packages: Springer Book Archive