Please use this identifier to cite or link to this item: https://hdl.handle.net/11147/13692
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGül, Çağdaştr
dc.contributor.authorKara, Orhuntr
dc.date.accessioned2023-07-27T19:51:16Z-
dc.date.available2023-07-27T19:51:16Z-
dc.date.issued2023-
dc.identifier.issn1556-6013-
dc.identifier.urihttps://doi.org/10.1109/TIFS.2023.3287412-
dc.identifier.urihttps://hdl.handle.net/11147/13692-
dc.description.abstractWe introduce a new construction method of diffusion layers for Substitution Permutation Network (SPN) structures along with its security proofs. The new method can be used in block ciphers, stream ciphers, hash functions, and sponge constructions. Moreover, we define a new stream cipher mode of operation through a fixed pseudorandom permutation and provide its security proofs in the indistinguishability model. We refer to a stream cipher as a Small Internal State Stream (SISS) cipher if its internal state size is less than twice its key size. There are not many studies about how to design and analyze SISS ciphers due to the criterion on the internal state sizes, resulting from the classical tradeoff attacks. We utilize our new mode and diffusion layer construction to design an SISS cipher having two versions, which we call DIZY. We further provide security analyses and hardware implementations of DIZY. In terms of area cost, power, and energy consumption, the hardware performance is among the best when compared to some prominent stream ciphers, especially for frame-based encryptions that need frequent initialization. Unlike recent SISS ciphers such as Sprout, Plantlet, LILLE, and Fruit; DIZY does not have a keyed update function, enabling efficient key changing. © 2005-2012 IEEE.en_US
dc.description.sponsorshipThe work of Orhun Kara was supported in part by TÜB?ITAK 1001 Project under Grant 121E228en_US
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.relationHafifsiklet Akan Şifre Algoritmaları Tasarım Ölçütleri ve Güvenlik Analizleritr
dc.relation.ispartofIEEE Transactions on Information Forensics and Securityen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectBlock cipheren_US
dc.subjectDiffusion layersen_US
dc.subjectKeystreamen_US
dc.subjectLightweight ciphersen_US
dc.subjectStream ciphersen_US
dc.subjectTradeoff attacksen_US
dc.titleA new construction method for keystream generatorsen_US
dc.typeArticleen_US
dc.institutionauthorKara, Orhuntr
dc.departmentİzmir Institute of Technology. Mathematicsen_US
dc.identifier.volume18en_US
dc.identifier.startpage3735en_US
dc.identifier.endpage3744en_US
dc.identifier.wosWOS:001021310000007en_US
dc.identifier.scopus2-s2.0-85162903017en_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıtr
dc.identifier.doi10.1109/TIFS.2023.3287412-
dc.relation.grantno121E228-
dc.authorscopusid58350077500-
dc.authorscopusid23396967100-
dc.identifier.scopusqualityQ1-
item.fulltextWith Fulltext-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.grantfulltextopen-
item.cerifentitytypePublications-
item.openairetypeArticle-
item.languageiso639-1en-
crisitem.author.dept04.02. Department of Mathematics-
Appears in Collections:Mathematics / Matematik
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection
Files in This Item:
File SizeFormat 
A_New_Construction.pdf2.24 MBAdobe PDFView/Open
Show simple item record



CORE Recommender

Page view(s)

58
checked on May 6, 2024

Download(s)

60
checked on May 6, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.