Stream cipher designs: a review View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2020-02-10

AUTHORS

Lin Jiao, Yonglin Hao, Dengguo Feng

ABSTRACT

Stream cipher is an important branch of symmetric cryptosystems, which takes obvious advantages in speed and scale of hardware implementation. It is suitable for using in the cases of massive data transfer or resource constraints, and has always been a hot and central research topic in cryptography. With the rapid development of network and communication technology, cipher algorithms play more and more crucial role in information security. Simultaneously, the application environment of cipher algorithms is increasingly complex, which challenges the existing cipher algorithms and calls for novel suitable designs. To accommodate new strict requirements and provide systematic scientific basis for future designs, this paper reviews the development history of stream ciphers, classifies and summarizes the design principles of typical stream ciphers in groups, briefly discusses the advantages and weakness of various stream ciphers in terms of security and implementation. Finally, it tries to foresee the prospective design directions of stream ciphers. More... »

PAGES

131101

References to SciGraph publications

  • 1997. On the security of self-synchronous ciphers in INFORMATION SECURITY AND PRIVACY
  • 1989-10. Fast correlation attacks on certain stream ciphers in JOURNAL OF CRYPTOLOGY
  • 2015-08-01. Cryptanalysis of Full Sprout in ADVANCES IN CRYPTOLOGY -- CRYPTO 2015
  • 2008. Breaking the F-FCSR-H Stream Cipher in Real Time in ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008
  • 2003. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback in ADVANCES IN CRYPTOLOGY - CRYPTO 2003
  • 2000-10-27. CRYPTREC Project Cryptographic Evaluation Project for the Japanese Electronic Government in ADVANCES IN CRYPTOLOGY — ASIACRYPT 2000
  • 2002-07-12. A New Keystream Generator MUGI in FAST SOFTWARE ENCRYPTION
  • 2002-07-12. Scream: A Software-Efficient Stream Cipher in FAST SOFTWARE ENCRYPTION
  • 1986. Analysis and Design of Stream Ciphers in NONE
  • 2008. New Stream Cipher Designs, The eSTREAM Finalists in NONE
  • 2016. Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks in SELECTED AREAS IN CRYPTOGRAPHY – SAC 2015
  • 2000-10-27. Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers in ADVANCES IN CRYPTOLOGY — ASIACRYPT 2000
  • 2003-05-13. Algebraic Attacks on Stream Ciphers with Linear Feedback in ADVANCES IN CRYPTOLOGY — EUROCRYPT 2003
  • 2014-05-21. AEGIS: A Fast Authenticated Encryption Algorithm in SELECTED AREAS IN CRYPTOGRAPHY -- SAC 2013
  • 2006. Cryptanalysis of Grain in FAST SOFTWARE ENCRYPTION
  • 2015-08-12. On Lightweight Stream Ciphers with Shorter Internal States in FAST SOFTWARE ENCRYPTION
  • 1981. On the generation of cryptographically strong pseudo-random sequences in AUTOMATA, LANGUAGES AND PROGRAMMING
  • 2005. F-FCSR: Design of a New Class of Stream Ciphers in FAST SOFTWARE ENCRYPTION
  • 2015-04-14. Ciphers for MPC and FHE in ADVANCES IN CRYPTOLOGY -- EUROCRYPT 2015
  • 2004. A New Stream Cipher HC-256 in FAST SOFTWARE ENCRYPTION
  • 1998-10-16. Fast Hashing and Stream Encryption with Panama in FAST SOFTWARE ENCRYPTION
  • 2016-07-20. Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression in FAST SOFTWARE ENCRYPTION
  • 2016-04-28. Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2016
  • 2005. Synchronous Stream Cipher in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2015-09-01. TriviA: A Fast and Secure Authenticated Encryption Scheme in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS -- CHES 2015
  • 2001-04-25. LILI Keystream Generator in SELECTED AREAS IN CRYPTOGRAPHY
  • 2016-07-21. Cryptanalysis of the FLIP Family of Stream Ciphers in ADVANCES IN CRYPTOLOGY – CRYPTO 2016
  • 2003. Rabbit: A New High-Performance Stream Cipher in FAST SOFTWARE ENCRYPTION
  • 2008. Sosemanuk, a Fast Software-Oriented Stream Cipher in NEW STREAM CIPHER DESIGNS
  • 2009. Cube Attacks on Tweakable Black Box Polynomials in ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009
  • 2018-05-08. On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks in CRYPTOGRAPHY AND COMMUNICATIONS
  • 2007-10-13. Cryptanalysis of an E0-like Combiner with Memory in JOURNAL OF CRYPTOLOGY
  • 2011. ECRYPT Stream Cipher Project in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 1991. Internet Communication with End-to-End Performance Guarantees in TELEKOMMUNIKATION UND MULTIMEDIALE ANWENDUNGEN DER INFORMATIK
  • 2008-01-01. The Stream Cipher HC-128 in NEW STREAM CIPHER DESIGNS
  • 1999. Slide Attacks in FAST SOFTWARE ENCRYPTION
  • 2016-01-09. Analysis of the Authenticated Cipher MORUS (v1) in CRYPTOGRAPHY AND INFORMATION SECURITY IN THE BALKANS
  • 2015-12-30. Another Tradeoff Attack on Sprout-Like Stream Ciphers in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2015
  • 2013. Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness in TOPICS IN CRYPTOLOGY – CT-RSA 2013
  • 2012. Practical Leakage-Resilient Symmetric Cryptography in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS – CHES 2012
  • 2003-02-17. Guess-and-Determine Attacks on SNOW in SELECTED AREAS IN CRYPTOGRAPHY
  • 2003-02-17. A New Version of the Stream Cipher SNOW in SELECTED AREAS IN CRYPTOGRAPHY
  • Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/s11432-018-9929-x

    DOI

    http://dx.doi.org/10.1007/s11432-018-9929-x

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1124844892


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0802", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Computation Theory and Mathematics", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "State Key Laboratory of Cryptology, 100878, Beijing, China", 
              "id": "http://www.grid.ac/institutes/grid.496622.d", 
              "name": [
                "State Key Laboratory of Cryptology, 100878, Beijing, China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Jiao", 
            "givenName": "Lin", 
            "id": "sg:person.013623113203.92", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013623113203.92"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "State Key Laboratory of Cryptology, 100878, Beijing, China", 
              "id": "http://www.grid.ac/institutes/grid.496622.d", 
              "name": [
                "State Key Laboratory of Cryptology, 100878, Beijing, China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Hao", 
            "givenName": "Yonglin", 
            "id": "sg:person.014270173173.47", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014270173173.47"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, 100190, Beijing, China", 
              "id": "http://www.grid.ac/institutes/grid.458446.f", 
              "name": [
                "State Key Laboratory of Cryptology, 100878, Beijing, China", 
                "State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, 100190, Beijing, China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Feng", 
            "givenName": "Dengguo", 
            "id": "sg:person.011604235150.06", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011604235150.06"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/978-3-662-52993-5_16", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1052565510", 
              "https://doi.org/10.1007/978-3-662-52993-5_16"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-46800-5_17", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1034979592", 
              "https://doi.org/10.1007/978-3-662-46800-5_17"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-45146-4_11", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1020782332", 
              "https://doi.org/10.1007/978-3-540-45146-4_11"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bfb0027923", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1009929593", 
              "https://doi.org/10.1007/bfb0027923"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-01001-9_16", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1052713322", 
              "https://doi.org/10.1007/978-3-642-01001-9_16"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-31301-6_4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1035779896", 
              "https://doi.org/10.1007/978-3-319-31301-6_4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-45661-9_15", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1010834114", 
              "https://doi.org/10.1007/3-540-45661-9_15"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44983-3_18", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1004487644", 
              "https://doi.org/10.1007/3-540-44983-3_18"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-29172-7_4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1050537792", 
              "https://doi.org/10.1007/978-3-319-29172-7_4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-48324-4_17", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1023467432", 
              "https://doi.org/10.1007/978-3-662-48324-4_17"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-47989-6_32", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1023908343", 
              "https://doi.org/10.1007/978-3-662-47989-6_32"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-48116-5_22", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1032917707", 
              "https://doi.org/10.1007/978-3-662-48116-5_22"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-68351-3", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1010579582", 
              "https://doi.org/10.1007/978-3-540-68351-3"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-39887-5_23", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1042494507", 
              "https://doi.org/10.1007/978-3-540-39887-5_23"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-48800-3_23", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1001321237", 
              "https://doi.org/10.1007/978-3-662-48800-3_23"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44448-3_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1020490931", 
              "https://doi.org/10.1007/3-540-44448-3_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-43414-7_10", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1032051449", 
              "https://doi.org/10.1007/978-3-662-43414-7_10"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/0-387-23483-7_423", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1022297430", 
              "https://doi.org/10.1007/0-387-23483-7_423"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-77060-9_23", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1038682958", 
              "https://doi.org/10.1007/978-3-642-77060-9_23"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s12095-018-0294-5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1103887204", 
              "https://doi.org/10.1007/s12095-018-0294-5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-45661-9_14", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1004383601", 
              "https://doi.org/10.1007/3-540-45661-9_14"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-82865-2", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1019467649", 
              "https://doi.org/10.1007/978-3-642-82865-2"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-49890-3_13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1014166962", 
              "https://doi.org/10.1007/978-3-662-49890-3_13"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44448-3_30", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1008342719", 
              "https://doi.org/10.1007/3-540-44448-3_30"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bf02252874", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1044904154", 
              "https://doi.org/10.1007/bf02252874"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-48519-8_18", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1030136651", 
              "https://doi.org/10.1007/3-540-48519-8_18"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-1-4419-5906-5_1106", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1053539644", 
              "https://doi.org/10.1007/978-1-4419-5906-5_1106"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-10843-2_43", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1010725838", 
              "https://doi.org/10.1007/3-540-10843-2_43"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-36095-4_15", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1032057667", 
              "https://doi.org/10.1007/978-3-642-36095-4_15"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-68351-3_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1039139667", 
              "https://doi.org/10.1007/978-3-540-68351-3_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-53018-4_17", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1022089464", 
              "https://doi.org/10.1007/978-3-662-53018-4_17"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-39200-9_21", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1043854228", 
              "https://doi.org/10.1007/3-540-39200-9_21"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-69710-1_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1018936802", 
              "https://doi.org/10.1007/3-540-69710-1_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-36492-7_4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1033505691", 
              "https://doi.org/10.1007/3-540-36492-7_4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-89255-7_34", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1050877500", 
              "https://doi.org/10.1007/978-3-540-89255-7_34"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-36492-7_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1034179534", 
              "https://doi.org/10.1007/3-540-36492-7_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-25937-4_15", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1053053970", 
              "https://doi.org/10.1007/978-3-540-25937-4_15"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11502760_6", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1008118776", 
              "https://doi.org/10.1007/11502760_6"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11799313_2", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1033079283", 
              "https://doi.org/10.1007/11799313_2"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s00145-007-9017-3", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1050562460", 
              "https://doi.org/10.1007/s00145-007-9017-3"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-33027-8_13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1018452242", 
              "https://doi.org/10.1007/978-3-642-33027-8_13"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-68351-3_4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1046541781", 
              "https://doi.org/10.1007/978-3-540-68351-3_4"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2020-02-10", 
        "datePublishedReg": "2020-02-10", 
        "description": "Stream cipher is an important branch of symmetric cryptosystems, which takes obvious advantages in speed and scale of hardware implementation. It is suitable for using in the cases of massive data transfer or resource constraints, and has always been a hot and central research topic in cryptography. With the rapid development of network and communication technology, cipher algorithms play more and more crucial role in information security. Simultaneously, the application environment of cipher algorithms is increasingly complex, which challenges the existing cipher algorithms and calls for novel suitable designs. To accommodate new strict requirements and provide systematic scientific basis for future designs, this paper reviews the development history of stream ciphers, classifies and summarizes the design principles of typical stream ciphers in groups, briefly discusses the advantages and weakness of various stream ciphers in terms of security and implementation. Finally, it tries to foresee the prospective design directions of stream ciphers.", 
        "genre": "article", 
        "id": "sg:pub.10.1007/s11432-018-9929-x", 
        "inLanguage": "en", 
        "isAccessibleForFree": false, 
        "isFundedItemOf": [
          {
            "id": "sg:grant.8945871", 
            "type": "MonetaryGrant"
          }
        ], 
        "isPartOf": [
          {
            "id": "sg:journal.1135989", 
            "issn": [
              "1009-2757", 
              "1674-733X"
            ], 
            "name": "Science China Information Sciences", 
            "publisher": "Springer Nature", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "3", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "63"
          }
        ], 
        "keywords": [
          "cipher algorithm", 
          "stream cipher", 
          "terms of security", 
          "massive data transfer", 
          "information security", 
          "symmetric cryptosystem", 
          "hardware implementation", 
          "data transfer", 
          "application environment", 
          "communication technologies", 
          "resource constraints", 
          "central research topic", 
          "cipher", 
          "research topic", 
          "rapid development", 
          "important branch", 
          "algorithm", 
          "more crucial role", 
          "design principles", 
          "security", 
          "strict requirements", 
          "design direction", 
          "obvious advantages", 
          "implementation", 
          "cryptography", 
          "cryptosystem", 
          "development history", 
          "classifies", 
          "network", 
          "advantages", 
          "design", 
          "technology", 
          "requirements", 
          "suitable design", 
          "constraints", 
          "environment", 
          "future design", 
          "speed", 
          "topic", 
          "calls", 
          "weakness", 
          "principles", 
          "terms", 
          "development", 
          "direction", 
          "branches", 
          "crucial role", 
          "basis", 
          "cases", 
          "scale", 
          "scientific basis", 
          "transfer", 
          "review", 
          "role", 
          "group", 
          "history", 
          "paper"
        ], 
        "name": "Stream cipher designs: a review", 
        "pagination": "131101", 
        "productId": [
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1124844892"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/s11432-018-9929-x"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1007/s11432-018-9929-x", 
          "https://app.dimensions.ai/details/publication/pub.1124844892"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2022-06-01T22:21", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20220601/entities/gbq_results/article/article_853.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "https://doi.org/10.1007/s11432-018-9929-x"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s11432-018-9929-x'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s11432-018-9929-x'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s11432-018-9929-x'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s11432-018-9929-x'


     

    This table displays all metadata directly associated to this object as RDF triples.

    307 TRIPLES      22 PREDICATES      125 URIs      74 LITERALS      6 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/s11432-018-9929-x schema:about anzsrc-for:08
    2 anzsrc-for:0802
    3 anzsrc-for:0804
    4 schema:author N4bd6022481f44449893effc4e20e88a4
    5 schema:citation sg:pub.10.1007/0-387-23483-7_423
    6 sg:pub.10.1007/11502760_6
    7 sg:pub.10.1007/11799313_2
    8 sg:pub.10.1007/3-540-10843-2_43
    9 sg:pub.10.1007/3-540-36492-7_4
    10 sg:pub.10.1007/3-540-36492-7_5
    11 sg:pub.10.1007/3-540-39200-9_21
    12 sg:pub.10.1007/3-540-44448-3_1
    13 sg:pub.10.1007/3-540-44448-3_30
    14 sg:pub.10.1007/3-540-44983-3_18
    15 sg:pub.10.1007/3-540-45661-9_14
    16 sg:pub.10.1007/3-540-45661-9_15
    17 sg:pub.10.1007/3-540-48519-8_18
    18 sg:pub.10.1007/3-540-69710-1_5
    19 sg:pub.10.1007/978-1-4419-5906-5_1106
    20 sg:pub.10.1007/978-3-319-29172-7_4
    21 sg:pub.10.1007/978-3-319-31301-6_4
    22 sg:pub.10.1007/978-3-540-25937-4_15
    23 sg:pub.10.1007/978-3-540-39887-5_23
    24 sg:pub.10.1007/978-3-540-45146-4_11
    25 sg:pub.10.1007/978-3-540-68351-3
    26 sg:pub.10.1007/978-3-540-68351-3_4
    27 sg:pub.10.1007/978-3-540-68351-3_9
    28 sg:pub.10.1007/978-3-540-89255-7_34
    29 sg:pub.10.1007/978-3-642-01001-9_16
    30 sg:pub.10.1007/978-3-642-33027-8_13
    31 sg:pub.10.1007/978-3-642-36095-4_15
    32 sg:pub.10.1007/978-3-642-77060-9_23
    33 sg:pub.10.1007/978-3-642-82865-2
    34 sg:pub.10.1007/978-3-662-43414-7_10
    35 sg:pub.10.1007/978-3-662-46800-5_17
    36 sg:pub.10.1007/978-3-662-47989-6_32
    37 sg:pub.10.1007/978-3-662-48116-5_22
    38 sg:pub.10.1007/978-3-662-48324-4_17
    39 sg:pub.10.1007/978-3-662-48800-3_23
    40 sg:pub.10.1007/978-3-662-49890-3_13
    41 sg:pub.10.1007/978-3-662-52993-5_16
    42 sg:pub.10.1007/978-3-662-53018-4_17
    43 sg:pub.10.1007/bf02252874
    44 sg:pub.10.1007/bfb0027923
    45 sg:pub.10.1007/s00145-007-9017-3
    46 sg:pub.10.1007/s12095-018-0294-5
    47 schema:datePublished 2020-02-10
    48 schema:datePublishedReg 2020-02-10
    49 schema:description Stream cipher is an important branch of symmetric cryptosystems, which takes obvious advantages in speed and scale of hardware implementation. It is suitable for using in the cases of massive data transfer or resource constraints, and has always been a hot and central research topic in cryptography. With the rapid development of network and communication technology, cipher algorithms play more and more crucial role in information security. Simultaneously, the application environment of cipher algorithms is increasingly complex, which challenges the existing cipher algorithms and calls for novel suitable designs. To accommodate new strict requirements and provide systematic scientific basis for future designs, this paper reviews the development history of stream ciphers, classifies and summarizes the design principles of typical stream ciphers in groups, briefly discusses the advantages and weakness of various stream ciphers in terms of security and implementation. Finally, it tries to foresee the prospective design directions of stream ciphers.
    50 schema:genre article
    51 schema:inLanguage en
    52 schema:isAccessibleForFree false
    53 schema:isPartOf N3000c86eedfa4ffab98afaaad0a17989
    54 Nfb6f96fdf65e4d9f847529c8a75df78b
    55 sg:journal.1135989
    56 schema:keywords advantages
    57 algorithm
    58 application environment
    59 basis
    60 branches
    61 calls
    62 cases
    63 central research topic
    64 cipher
    65 cipher algorithm
    66 classifies
    67 communication technologies
    68 constraints
    69 crucial role
    70 cryptography
    71 cryptosystem
    72 data transfer
    73 design
    74 design direction
    75 design principles
    76 development
    77 development history
    78 direction
    79 environment
    80 future design
    81 group
    82 hardware implementation
    83 history
    84 implementation
    85 important branch
    86 information security
    87 massive data transfer
    88 more crucial role
    89 network
    90 obvious advantages
    91 paper
    92 principles
    93 rapid development
    94 requirements
    95 research topic
    96 resource constraints
    97 review
    98 role
    99 scale
    100 scientific basis
    101 security
    102 speed
    103 stream cipher
    104 strict requirements
    105 suitable design
    106 symmetric cryptosystem
    107 technology
    108 terms
    109 terms of security
    110 topic
    111 transfer
    112 weakness
    113 schema:name Stream cipher designs: a review
    114 schema:pagination 131101
    115 schema:productId N547a1fe59fc24cc48dd5a67add57bef3
    116 Nd54bf97df42742caaf1a69c7583be632
    117 schema:sameAs https://app.dimensions.ai/details/publication/pub.1124844892
    118 https://doi.org/10.1007/s11432-018-9929-x
    119 schema:sdDatePublished 2022-06-01T22:21
    120 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    121 schema:sdPublisher Nd59b4ef9809041638b2bf865624259c9
    122 schema:url https://doi.org/10.1007/s11432-018-9929-x
    123 sgo:license sg:explorer/license/
    124 sgo:sdDataset articles
    125 rdf:type schema:ScholarlyArticle
    126 N0a03f424ddce428e9e5358cdaa799ab0 rdf:first sg:person.014270173173.47
    127 rdf:rest N603b21f6aa1d485fa9bc2fdfceea02e1
    128 N3000c86eedfa4ffab98afaaad0a17989 schema:issueNumber 3
    129 rdf:type schema:PublicationIssue
    130 N4bd6022481f44449893effc4e20e88a4 rdf:first sg:person.013623113203.92
    131 rdf:rest N0a03f424ddce428e9e5358cdaa799ab0
    132 N547a1fe59fc24cc48dd5a67add57bef3 schema:name doi
    133 schema:value 10.1007/s11432-018-9929-x
    134 rdf:type schema:PropertyValue
    135 N603b21f6aa1d485fa9bc2fdfceea02e1 rdf:first sg:person.011604235150.06
    136 rdf:rest rdf:nil
    137 Nd54bf97df42742caaf1a69c7583be632 schema:name dimensions_id
    138 schema:value pub.1124844892
    139 rdf:type schema:PropertyValue
    140 Nd59b4ef9809041638b2bf865624259c9 schema:name Springer Nature - SN SciGraph project
    141 rdf:type schema:Organization
    142 Nfb6f96fdf65e4d9f847529c8a75df78b schema:volumeNumber 63
    143 rdf:type schema:PublicationVolume
    144 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    145 schema:name Information and Computing Sciences
    146 rdf:type schema:DefinedTerm
    147 anzsrc-for:0802 schema:inDefinedTermSet anzsrc-for:
    148 schema:name Computation Theory and Mathematics
    149 rdf:type schema:DefinedTerm
    150 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    151 schema:name Data Format
    152 rdf:type schema:DefinedTerm
    153 sg:grant.8945871 http://pending.schema.org/fundedItem sg:pub.10.1007/s11432-018-9929-x
    154 rdf:type schema:MonetaryGrant
    155 sg:journal.1135989 schema:issn 1009-2757
    156 1674-733X
    157 schema:name Science China Information Sciences
    158 schema:publisher Springer Nature
    159 rdf:type schema:Periodical
    160 sg:person.011604235150.06 schema:affiliation grid-institutes:grid.458446.f
    161 schema:familyName Feng
    162 schema:givenName Dengguo
    163 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011604235150.06
    164 rdf:type schema:Person
    165 sg:person.013623113203.92 schema:affiliation grid-institutes:grid.496622.d
    166 schema:familyName Jiao
    167 schema:givenName Lin
    168 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013623113203.92
    169 rdf:type schema:Person
    170 sg:person.014270173173.47 schema:affiliation grid-institutes:grid.496622.d
    171 schema:familyName Hao
    172 schema:givenName Yonglin
    173 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014270173173.47
    174 rdf:type schema:Person
    175 sg:pub.10.1007/0-387-23483-7_423 schema:sameAs https://app.dimensions.ai/details/publication/pub.1022297430
    176 https://doi.org/10.1007/0-387-23483-7_423
    177 rdf:type schema:CreativeWork
    178 sg:pub.10.1007/11502760_6 schema:sameAs https://app.dimensions.ai/details/publication/pub.1008118776
    179 https://doi.org/10.1007/11502760_6
    180 rdf:type schema:CreativeWork
    181 sg:pub.10.1007/11799313_2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1033079283
    182 https://doi.org/10.1007/11799313_2
    183 rdf:type schema:CreativeWork
    184 sg:pub.10.1007/3-540-10843-2_43 schema:sameAs https://app.dimensions.ai/details/publication/pub.1010725838
    185 https://doi.org/10.1007/3-540-10843-2_43
    186 rdf:type schema:CreativeWork
    187 sg:pub.10.1007/3-540-36492-7_4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1033505691
    188 https://doi.org/10.1007/3-540-36492-7_4
    189 rdf:type schema:CreativeWork
    190 sg:pub.10.1007/3-540-36492-7_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1034179534
    191 https://doi.org/10.1007/3-540-36492-7_5
    192 rdf:type schema:CreativeWork
    193 sg:pub.10.1007/3-540-39200-9_21 schema:sameAs https://app.dimensions.ai/details/publication/pub.1043854228
    194 https://doi.org/10.1007/3-540-39200-9_21
    195 rdf:type schema:CreativeWork
    196 sg:pub.10.1007/3-540-44448-3_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020490931
    197 https://doi.org/10.1007/3-540-44448-3_1
    198 rdf:type schema:CreativeWork
    199 sg:pub.10.1007/3-540-44448-3_30 schema:sameAs https://app.dimensions.ai/details/publication/pub.1008342719
    200 https://doi.org/10.1007/3-540-44448-3_30
    201 rdf:type schema:CreativeWork
    202 sg:pub.10.1007/3-540-44983-3_18 schema:sameAs https://app.dimensions.ai/details/publication/pub.1004487644
    203 https://doi.org/10.1007/3-540-44983-3_18
    204 rdf:type schema:CreativeWork
    205 sg:pub.10.1007/3-540-45661-9_14 schema:sameAs https://app.dimensions.ai/details/publication/pub.1004383601
    206 https://doi.org/10.1007/3-540-45661-9_14
    207 rdf:type schema:CreativeWork
    208 sg:pub.10.1007/3-540-45661-9_15 schema:sameAs https://app.dimensions.ai/details/publication/pub.1010834114
    209 https://doi.org/10.1007/3-540-45661-9_15
    210 rdf:type schema:CreativeWork
    211 sg:pub.10.1007/3-540-48519-8_18 schema:sameAs https://app.dimensions.ai/details/publication/pub.1030136651
    212 https://doi.org/10.1007/3-540-48519-8_18
    213 rdf:type schema:CreativeWork
    214 sg:pub.10.1007/3-540-69710-1_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1018936802
    215 https://doi.org/10.1007/3-540-69710-1_5
    216 rdf:type schema:CreativeWork
    217 sg:pub.10.1007/978-1-4419-5906-5_1106 schema:sameAs https://app.dimensions.ai/details/publication/pub.1053539644
    218 https://doi.org/10.1007/978-1-4419-5906-5_1106
    219 rdf:type schema:CreativeWork
    220 sg:pub.10.1007/978-3-319-29172-7_4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1050537792
    221 https://doi.org/10.1007/978-3-319-29172-7_4
    222 rdf:type schema:CreativeWork
    223 sg:pub.10.1007/978-3-319-31301-6_4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1035779896
    224 https://doi.org/10.1007/978-3-319-31301-6_4
    225 rdf:type schema:CreativeWork
    226 sg:pub.10.1007/978-3-540-25937-4_15 schema:sameAs https://app.dimensions.ai/details/publication/pub.1053053970
    227 https://doi.org/10.1007/978-3-540-25937-4_15
    228 rdf:type schema:CreativeWork
    229 sg:pub.10.1007/978-3-540-39887-5_23 schema:sameAs https://app.dimensions.ai/details/publication/pub.1042494507
    230 https://doi.org/10.1007/978-3-540-39887-5_23
    231 rdf:type schema:CreativeWork
    232 sg:pub.10.1007/978-3-540-45146-4_11 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020782332
    233 https://doi.org/10.1007/978-3-540-45146-4_11
    234 rdf:type schema:CreativeWork
    235 sg:pub.10.1007/978-3-540-68351-3 schema:sameAs https://app.dimensions.ai/details/publication/pub.1010579582
    236 https://doi.org/10.1007/978-3-540-68351-3
    237 rdf:type schema:CreativeWork
    238 sg:pub.10.1007/978-3-540-68351-3_4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1046541781
    239 https://doi.org/10.1007/978-3-540-68351-3_4
    240 rdf:type schema:CreativeWork
    241 sg:pub.10.1007/978-3-540-68351-3_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1039139667
    242 https://doi.org/10.1007/978-3-540-68351-3_9
    243 rdf:type schema:CreativeWork
    244 sg:pub.10.1007/978-3-540-89255-7_34 schema:sameAs https://app.dimensions.ai/details/publication/pub.1050877500
    245 https://doi.org/10.1007/978-3-540-89255-7_34
    246 rdf:type schema:CreativeWork
    247 sg:pub.10.1007/978-3-642-01001-9_16 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052713322
    248 https://doi.org/10.1007/978-3-642-01001-9_16
    249 rdf:type schema:CreativeWork
    250 sg:pub.10.1007/978-3-642-33027-8_13 schema:sameAs https://app.dimensions.ai/details/publication/pub.1018452242
    251 https://doi.org/10.1007/978-3-642-33027-8_13
    252 rdf:type schema:CreativeWork
    253 sg:pub.10.1007/978-3-642-36095-4_15 schema:sameAs https://app.dimensions.ai/details/publication/pub.1032057667
    254 https://doi.org/10.1007/978-3-642-36095-4_15
    255 rdf:type schema:CreativeWork
    256 sg:pub.10.1007/978-3-642-77060-9_23 schema:sameAs https://app.dimensions.ai/details/publication/pub.1038682958
    257 https://doi.org/10.1007/978-3-642-77060-9_23
    258 rdf:type schema:CreativeWork
    259 sg:pub.10.1007/978-3-642-82865-2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1019467649
    260 https://doi.org/10.1007/978-3-642-82865-2
    261 rdf:type schema:CreativeWork
    262 sg:pub.10.1007/978-3-662-43414-7_10 schema:sameAs https://app.dimensions.ai/details/publication/pub.1032051449
    263 https://doi.org/10.1007/978-3-662-43414-7_10
    264 rdf:type schema:CreativeWork
    265 sg:pub.10.1007/978-3-662-46800-5_17 schema:sameAs https://app.dimensions.ai/details/publication/pub.1034979592
    266 https://doi.org/10.1007/978-3-662-46800-5_17
    267 rdf:type schema:CreativeWork
    268 sg:pub.10.1007/978-3-662-47989-6_32 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023908343
    269 https://doi.org/10.1007/978-3-662-47989-6_32
    270 rdf:type schema:CreativeWork
    271 sg:pub.10.1007/978-3-662-48116-5_22 schema:sameAs https://app.dimensions.ai/details/publication/pub.1032917707
    272 https://doi.org/10.1007/978-3-662-48116-5_22
    273 rdf:type schema:CreativeWork
    274 sg:pub.10.1007/978-3-662-48324-4_17 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023467432
    275 https://doi.org/10.1007/978-3-662-48324-4_17
    276 rdf:type schema:CreativeWork
    277 sg:pub.10.1007/978-3-662-48800-3_23 schema:sameAs https://app.dimensions.ai/details/publication/pub.1001321237
    278 https://doi.org/10.1007/978-3-662-48800-3_23
    279 rdf:type schema:CreativeWork
    280 sg:pub.10.1007/978-3-662-49890-3_13 schema:sameAs https://app.dimensions.ai/details/publication/pub.1014166962
    281 https://doi.org/10.1007/978-3-662-49890-3_13
    282 rdf:type schema:CreativeWork
    283 sg:pub.10.1007/978-3-662-52993-5_16 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052565510
    284 https://doi.org/10.1007/978-3-662-52993-5_16
    285 rdf:type schema:CreativeWork
    286 sg:pub.10.1007/978-3-662-53018-4_17 schema:sameAs https://app.dimensions.ai/details/publication/pub.1022089464
    287 https://doi.org/10.1007/978-3-662-53018-4_17
    288 rdf:type schema:CreativeWork
    289 sg:pub.10.1007/bf02252874 schema:sameAs https://app.dimensions.ai/details/publication/pub.1044904154
    290 https://doi.org/10.1007/bf02252874
    291 rdf:type schema:CreativeWork
    292 sg:pub.10.1007/bfb0027923 schema:sameAs https://app.dimensions.ai/details/publication/pub.1009929593
    293 https://doi.org/10.1007/bfb0027923
    294 rdf:type schema:CreativeWork
    295 sg:pub.10.1007/s00145-007-9017-3 schema:sameAs https://app.dimensions.ai/details/publication/pub.1050562460
    296 https://doi.org/10.1007/s00145-007-9017-3
    297 rdf:type schema:CreativeWork
    298 sg:pub.10.1007/s12095-018-0294-5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1103887204
    299 https://doi.org/10.1007/s12095-018-0294-5
    300 rdf:type schema:CreativeWork
    301 grid-institutes:grid.458446.f schema:alternateName State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, 100190, Beijing, China
    302 schema:name State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, 100190, Beijing, China
    303 State Key Laboratory of Cryptology, 100878, Beijing, China
    304 rdf:type schema:Organization
    305 grid-institutes:grid.496622.d schema:alternateName State Key Laboratory of Cryptology, 100878, Beijing, China
    306 schema:name State Key Laboratory of Cryptology, 100878, Beijing, China
    307 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...