CAR30: A new scalable stream cipher with rule 30

CAR30 is a new stream cipher that uses classical Rule 30 of Cellular Automata (CA) along with a Maximum Length Linear Hybrid CA. This design can be implemented efficiently both in hardware and software. It has a fast initialization algorithm that makes it suitable for small messages. The generic design of the cipher enables to scale up for any length of Key and IV. This paper describes the cipher with 128-bit Key and 120-bit IV and evaluates the security and implementation aspects of it. The main advantages of the proposed cipher are the flexibility of its design, good hardware throughput in comparison with state-of-the-art hardware oriented ciphers like Grain and Trivium and better software speed than the software oriented stream cipher Rabbit.

[1]  Parimal Pal Chaudhuri,et al.  Additive Cellular Automata Theory and Applications Volume I , 1997 .

[2]  T. E. Bjrstad Cryptanalysis of Grain using Time / Memory / Data Tradeos , 2008 .

[3]  T. E. Bjørstad Cryptanalysis of Grain using Time / Memory / Data Tradeoffs , 2008 .

[4]  Wieland Fischer,et al.  Differential Power Analysis of Stream Ciphers , 2007, CT-RSA.

[5]  Martin Hell,et al.  A Stream Cipher Proposal: Grain-128 , 2006, 2006 IEEE International Symposium on Information Theory.

[6]  Palash Sarkar The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers , 2002, CRYPTO.

[7]  Ed Dawson,et al.  Generalized Inversion Attack on Nonlinear Filter Generators , 2000, IEEE Trans. Computers.

[8]  Emmanuel Prouff,et al.  DPA Attacks and S-Boxes , 2005, FSE.

[9]  Jovan Dj. Golic On the Security of Nonlinear Filter Generators , 1996, FSE.

[10]  Matthew J. B. Robshaw,et al.  The eSTREAM Project , 2008, The eSTREAM Finalists.

[11]  Willi Meier,et al.  Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.

[12]  S. Wolfram Random sequence generation by cellular automata , 1986 .

[13]  Martin Boesgaard,et al.  Rabbit: A New High-Performance Stream Cipher , 2003, FSE.

[14]  Santanu Chattopadhyay,et al.  Additive cellular automata : theory and applications , 1997 .

[15]  Christophe Giraud,et al.  An Implementation of DES and AES, Secure against Some Attacks , 2001, CHES.

[16]  Willi Meier,et al.  Analysis of Pseudo Random Sequence Generated by Cellular Automata , 1991, EUROCRYPT.

[17]  Stephen Wolfram Cryptography with Cellular Automata , 1985, CRYPTO.

[18]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[19]  Alex Biryukov,et al.  Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers , 2000, ASIACRYPT.

[20]  Bart Preneel,et al.  Analysis of Grain's Initialization Algorithm , 2008, AFRICACRYPT.

[21]  Philip Hawkes,et al.  Guess-and-Determine Attacks on SNOW , 2002, Selected Areas in Cryptography.

[22]  Alexander Maximov Cryptanalysis of the "Grain" family of stream ciphers , 2006, ASIACCS '06.

[23]  Whitfield Diffie The first ten years of public-key cryptography , 1988 .

[24]  Stéphane Badel,et al.  ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware , 2010, CHES.

[25]  Adi Shamir,et al.  Cube Attacks on Tweakable Black Box Polynomials , 2009, IACR Cryptol. ePrint Arch..

[26]  Kris Gaj,et al.  Comparison of hardware performance of selected Phase II eSTREAM candidates , 2007 .

[27]  Claude Carlet,et al.  On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks , 2005, INDOCRYPT.