2020-02-10
AUTHORSLin Jiao, Yonglin Hao, Dengguo Feng
ABSTRACTStream cipher is an important branch of symmetric cryptosystems, which takes obvious advantages in speed and scale of hardware implementation. It is suitable for using in the cases of massive data transfer or resource constraints, and has always been a hot and central research topic in cryptography. With the rapid development of network and communication technology, cipher algorithms play more and more crucial role in information security. Simultaneously, the application environment of cipher algorithms is increasingly complex, which challenges the existing cipher algorithms and calls for novel suitable designs. To accommodate new strict requirements and provide systematic scientific basis for future designs, this paper reviews the development history of stream ciphers, classifies and summarizes the design principles of typical stream ciphers in groups, briefly discusses the advantages and weakness of various stream ciphers in terms of security and implementation. Finally, it tries to foresee the prospective design directions of stream ciphers. More... »
PAGES131101
http://scigraph.springernature.com/pub.10.1007/s11432-018-9929-x
DOIhttp://dx.doi.org/10.1007/s11432-018-9929-x
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1124844892
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information and Computing Sciences",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0802",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Computation Theory and Mathematics",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Data Format",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"alternateName": "State Key Laboratory of Cryptology, 100878, Beijing, China",
"id": "http://www.grid.ac/institutes/grid.496622.d",
"name": [
"State Key Laboratory of Cryptology, 100878, Beijing, China"
],
"type": "Organization"
},
"familyName": "Jiao",
"givenName": "Lin",
"id": "sg:person.013623113203.92",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013623113203.92"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "State Key Laboratory of Cryptology, 100878, Beijing, China",
"id": "http://www.grid.ac/institutes/grid.496622.d",
"name": [
"State Key Laboratory of Cryptology, 100878, Beijing, China"
],
"type": "Organization"
},
"familyName": "Hao",
"givenName": "Yonglin",
"id": "sg:person.014270173173.47",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014270173173.47"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, 100190, Beijing, China",
"id": "http://www.grid.ac/institutes/grid.458446.f",
"name": [
"State Key Laboratory of Cryptology, 100878, Beijing, China",
"State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, 100190, Beijing, China"
],
"type": "Organization"
},
"familyName": "Feng",
"givenName": "Dengguo",
"id": "sg:person.011604235150.06",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011604235150.06"
],
"type": "Person"
}
],
"citation": [
{
"id": "sg:pub.10.1007/978-3-662-52993-5_16",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1052565510",
"https://doi.org/10.1007/978-3-662-52993-5_16"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-662-46800-5_17",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1034979592",
"https://doi.org/10.1007/978-3-662-46800-5_17"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-540-45146-4_11",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1020782332",
"https://doi.org/10.1007/978-3-540-45146-4_11"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/bfb0027923",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1009929593",
"https://doi.org/10.1007/bfb0027923"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-642-01001-9_16",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1052713322",
"https://doi.org/10.1007/978-3-642-01001-9_16"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-319-31301-6_4",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1035779896",
"https://doi.org/10.1007/978-3-319-31301-6_4"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/3-540-45661-9_15",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1010834114",
"https://doi.org/10.1007/3-540-45661-9_15"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/3-540-44983-3_18",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1004487644",
"https://doi.org/10.1007/3-540-44983-3_18"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-319-29172-7_4",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1050537792",
"https://doi.org/10.1007/978-3-319-29172-7_4"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-662-48324-4_17",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1023467432",
"https://doi.org/10.1007/978-3-662-48324-4_17"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-662-47989-6_32",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1023908343",
"https://doi.org/10.1007/978-3-662-47989-6_32"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-662-48116-5_22",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1032917707",
"https://doi.org/10.1007/978-3-662-48116-5_22"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-540-68351-3",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1010579582",
"https://doi.org/10.1007/978-3-540-68351-3"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-540-39887-5_23",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1042494507",
"https://doi.org/10.1007/978-3-540-39887-5_23"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-662-48800-3_23",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1001321237",
"https://doi.org/10.1007/978-3-662-48800-3_23"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/3-540-44448-3_1",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1020490931",
"https://doi.org/10.1007/3-540-44448-3_1"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-662-43414-7_10",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1032051449",
"https://doi.org/10.1007/978-3-662-43414-7_10"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/0-387-23483-7_423",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1022297430",
"https://doi.org/10.1007/0-387-23483-7_423"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-642-77060-9_23",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1038682958",
"https://doi.org/10.1007/978-3-642-77060-9_23"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s12095-018-0294-5",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1103887204",
"https://doi.org/10.1007/s12095-018-0294-5"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/3-540-45661-9_14",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1004383601",
"https://doi.org/10.1007/3-540-45661-9_14"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-642-82865-2",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1019467649",
"https://doi.org/10.1007/978-3-642-82865-2"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-662-49890-3_13",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1014166962",
"https://doi.org/10.1007/978-3-662-49890-3_13"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/3-540-44448-3_30",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1008342719",
"https://doi.org/10.1007/3-540-44448-3_30"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/bf02252874",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1044904154",
"https://doi.org/10.1007/bf02252874"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/3-540-48519-8_18",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1030136651",
"https://doi.org/10.1007/3-540-48519-8_18"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-1-4419-5906-5_1106",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1053539644",
"https://doi.org/10.1007/978-1-4419-5906-5_1106"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/3-540-10843-2_43",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1010725838",
"https://doi.org/10.1007/3-540-10843-2_43"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-642-36095-4_15",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1032057667",
"https://doi.org/10.1007/978-3-642-36095-4_15"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-540-68351-3_9",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1039139667",
"https://doi.org/10.1007/978-3-540-68351-3_9"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-662-53018-4_17",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1022089464",
"https://doi.org/10.1007/978-3-662-53018-4_17"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/3-540-39200-9_21",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1043854228",
"https://doi.org/10.1007/3-540-39200-9_21"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/3-540-69710-1_5",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1018936802",
"https://doi.org/10.1007/3-540-69710-1_5"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/3-540-36492-7_4",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1033505691",
"https://doi.org/10.1007/3-540-36492-7_4"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-540-89255-7_34",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1050877500",
"https://doi.org/10.1007/978-3-540-89255-7_34"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/3-540-36492-7_5",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1034179534",
"https://doi.org/10.1007/3-540-36492-7_5"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-540-25937-4_15",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1053053970",
"https://doi.org/10.1007/978-3-540-25937-4_15"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/11502760_6",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1008118776",
"https://doi.org/10.1007/11502760_6"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/11799313_2",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1033079283",
"https://doi.org/10.1007/11799313_2"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s00145-007-9017-3",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1050562460",
"https://doi.org/10.1007/s00145-007-9017-3"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-642-33027-8_13",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1018452242",
"https://doi.org/10.1007/978-3-642-33027-8_13"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-540-68351-3_4",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1046541781",
"https://doi.org/10.1007/978-3-540-68351-3_4"
],
"type": "CreativeWork"
}
],
"datePublished": "2020-02-10",
"datePublishedReg": "2020-02-10",
"description": "Stream cipher is an important branch of symmetric cryptosystems, which takes obvious advantages in speed and scale of hardware implementation. It is suitable for using in the cases of massive data transfer or resource constraints, and has always been a hot and central research topic in cryptography. With the rapid development of network and communication technology, cipher algorithms play more and more crucial role in information security. Simultaneously, the application environment of cipher algorithms is increasingly complex, which challenges the existing cipher algorithms and calls for novel suitable designs. To accommodate new strict requirements and provide systematic scientific basis for future designs, this paper reviews the development history of stream ciphers, classifies and summarizes the design principles of typical stream ciphers in groups, briefly discusses the advantages and weakness of various stream ciphers in terms of security and implementation. Finally, it tries to foresee the prospective design directions of stream ciphers.",
"genre": "article",
"id": "sg:pub.10.1007/s11432-018-9929-x",
"inLanguage": "en",
"isAccessibleForFree": false,
"isFundedItemOf": [
{
"id": "sg:grant.8945871",
"type": "MonetaryGrant"
}
],
"isPartOf": [
{
"id": "sg:journal.1135989",
"issn": [
"1009-2757",
"1674-733X"
],
"name": "Science China Information Sciences",
"publisher": "Springer Nature",
"type": "Periodical"
},
{
"issueNumber": "3",
"type": "PublicationIssue"
},
{
"type": "PublicationVolume",
"volumeNumber": "63"
}
],
"keywords": [
"cipher algorithm",
"stream cipher",
"terms of security",
"massive data transfer",
"information security",
"symmetric cryptosystem",
"hardware implementation",
"data transfer",
"application environment",
"communication technologies",
"resource constraints",
"central research topic",
"cipher",
"research topic",
"rapid development",
"important branch",
"algorithm",
"more crucial role",
"design principles",
"security",
"strict requirements",
"design direction",
"obvious advantages",
"implementation",
"cryptography",
"cryptosystem",
"development history",
"classifies",
"network",
"advantages",
"design",
"technology",
"requirements",
"suitable design",
"constraints",
"environment",
"future design",
"speed",
"topic",
"calls",
"weakness",
"principles",
"terms",
"development",
"direction",
"branches",
"crucial role",
"basis",
"cases",
"scale",
"scientific basis",
"transfer",
"review",
"role",
"group",
"history",
"paper"
],
"name": "Stream cipher designs: a review",
"pagination": "131101",
"productId": [
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1124844892"
]
},
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/s11432-018-9929-x"
]
}
],
"sameAs": [
"https://doi.org/10.1007/s11432-018-9929-x",
"https://app.dimensions.ai/details/publication/pub.1124844892"
],
"sdDataset": "articles",
"sdDatePublished": "2022-06-01T22:21",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-springernature-scigraph/baseset/20220601/entities/gbq_results/article/article_853.jsonl",
"type": "ScholarlyArticle",
"url": "https://doi.org/10.1007/s11432-018-9929-x"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s11432-018-9929-x'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s11432-018-9929-x'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s11432-018-9929-x'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s11432-018-9929-x'
This table displays all metadata directly associated to this object as RDF triples.
307 TRIPLES
22 PREDICATES
125 URIs
74 LITERALS
6 BLANK NODES