Abstract
Now a day’s internet of things is one of the rapidly growing research field in the information technology domain. Offering security for this ever-augmenting technology is still remaining as the challenging task. Cryptographic techniques are used to authenticate and maintain confidentiality of message data. To maintain the security, system cryptographic algorithms and protocols are very essential. The system is mainly categorized into two groups namely stream cipher and block cipher. Stream cipher has its own advantage over block cipher. In this paper, we reviewed some of the stream ciphers. Selection of finest algorithms for the security of internet of things is very difficult in terms of energy and storage. The study aims to summarize some of the existing stream cipher techniques. This paper gives details on fundamental knowledge about encryption algorithms and its comparison. We also describe the design considerations of stream ciphers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ashouri, M.: Design of a New Stream Cipher: PALS (2018)
Ali, A.: Oppel-2: a new family of FCSR-based stream ciphers. In: 2014 International Conference on Emerging Technologies (ICET), pp. 75–80, Islamabad (2014). https://doi.org/10.1109/icet.2014.7021020
Berbain, C., et al.: DECIM, a new stream cipher for hardware applications (2005)
Ghafari, V.A., Hu, H.: Fruit: ultra-lightweight stream cipher with shorter internal state. IACR Cryptology ePrint Archive 2016/355 (2016)
Ghafari, A.V., Hu, H.: Fruit-80: a secure ultra-lightweight stream cipher for constrained environments. Entropy 20, 180 (2018)
Hamann, M., et al.: LIZARD - a lightweight stream cipher for power-constrained devices. IACR Trans. Symmetric Cryptol. 2017, 45–79 (2016)
Hell, M., Johansson, T., Meier, W.: Grain: a stream cipher for constrained environments. IJWMC 2, 86–93 (2007). https://doi.org/10.1504/IJWMC.2007.013798
Hell, M., Johansson, T., Maximov, A., Meier, W.: A stream cipher proposal: grain-128. In: 2006 IEEE International Symposium on Information Theory, pp. 1614–1618, Seattle (2006). https://doi.org/10.1109/isit.2006.261549
Biryukov, A.: Design of a new stream cipher—LEX. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol. 4986. Springer, Heidelberg (2008)
Kuznetsov, O., Lutsenko, M., Ivanenko, D.: Strumok stream cipher: specification and basic properties. In: 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T), pp. 59–62, Kharkiv (2016). https://doi.org/10.1109/infocommst.2016.7905335
Anashin, V., Bogdanov, A., Kizhvatov, I.: ABC: A New Fast Flexible Stream Cipher- eSTREAM, ECRYPT Stream Cipher Project, Report 2005/050 (2005)
Lee, H., Chen, K.: PingPong-128, a new stream cipher for ubiquitous application. In: 2007 International Conference on Convergence Information Technology (ICCIT 2007), pp. 1893–1899, Gyeongju (2007). https://doi.org/10.1109/iccit.2007.375
Gammel, B., Göttfert, R., Kniffler, O.: The Achterbahn stream cipher (2005)
Bernstein, D.J.: The Salsa20 family of stream ciphers (2007)
Bernstein, D.J.: ChaCha, a variant of Salsa20. In: Workshop Record of SASC (2008)
De Cannière, C.: Trivium: a stream cipher construction inspired by block cipher design principles. In: Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) Information Security, ISC 2006. LNCS, vol. 4176. Springer, Heidelberg (2006)
De Cannière, C., Preneel, B.: TRIVIUM — specifications. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/030 (2005). http://www.ecrypt.eu.org/stream
Nawaz, Y., Gong, G.: The WG stream cipher (2005)
Boesgaard, M., Vesterager, M., Pedersen, T., Christiansen, J., Scavenius, O.: Rabbit: a high-performance stream cipher. In: Proceedings of FSE 2003. LNCS, vol. 2887, pp. 307–329, Springer (2003)
Mantin, I.: Analysis of the Stream Cipher RC4 (2001)
Paul, G., Maitra, S., Chattopadhyay, A.: Quad-RC4: Merging Four RC4 States towards a 32-bit Stream Cipher.. IACR Cryptology ePrint Archive. 2013:572 (2013)
Stallings, W.: Cryptography And Network Security Principles And Practice. 4th edn. Pearson Education (2017)
Stallings, W.: Network Security Essentials: Applications and Standards. Prentice Hall (2003)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Chaithanya, S., Anitha, V. (2020). Comprehensive Study of Existing Stream Ciphers. In: Smys, S., Bestak, R., Rocha, Á. (eds) Inventive Computation Technologies. ICICIT 2019. Lecture Notes in Networks and Systems, vol 98. Springer, Cham. https://doi.org/10.1007/978-3-030-33846-6_41
Download citation
DOI: https://doi.org/10.1007/978-3-030-33846-6_41
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-33845-9
Online ISBN: 978-3-030-33846-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)