{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:04:12Z","timestamp":1742969052921,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030105907"},{"type":"electronic","value":"9783030105914"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,1,15]],"date-time":"2021-01-15T00:00:00Z","timestamp":1610668800000},"content-version":"vor","delay-in-days":14,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In this chapter we provide an overview of selected methods for the design and analysis of symmetric encryption algorithms that have recently been published. We start by discussing the practical advantages, limitations and security of the keystream generators with keyed update functions which were proposed for reducing the area cost of stream ciphers. Then we present an approach to enhancing the security of certain encryption schemes by employing a universal homophonic coding and randomized encryption paradigm.<\/jats:p>","DOI":"10.1007\/978-3-030-10591-4_3","type":"book-chapter","created":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T14:06:41Z","timestamp":1610633201000},"page":"49-62","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Selected Design and Analysis Techniques for Contemporary Symmetric Encryption"],"prefix":"10.1007","author":[{"given":"Vasily","family":"Mikhalev","sequence":"first","affiliation":[]},{"given":"Miodrag J.","family":"Mihaljevi\u0107","sequence":"additional","affiliation":[]},{"given":"Orhun","family":"Kara","sequence":"additional","affiliation":[]},{"given":"Frederik","family":"Armknecht","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,15]]},"reference":[{"issue":"1","key":"3_CR14","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1504\/IJWMC.2011.044106","volume":"5","author":"Martin \u00c5gren","year":"2011","unstructured":"Martin \u00c5gren, Martin Hell, Thomas Johansson, and Willi Meier. Grain-128a: a new version of Grain-128 with optional authentication. International Journal of Wireless and Mobile Computing, 5(1):48\u201359, 2011.","journal-title":"International Journal of Wireless and Mobile Computing"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Frederik Armknecht and Vasily Mikhalev. On lightweight stream ciphers with shorter internal states. In Gregor Leander, editor, Fast Software Encryption \u2013 FSE 2015, volume 9054 of Lecture Notes in Computer Science, pages 451\u2013470, Istanbul, Turkey, March 8\u201311, 2015. Springer.","DOI":"10.1007\/978-3-662-48116-5_22"},{"key":"3_CR47","doi-asserted-by":"crossref","unstructured":"Steve Babbage. Improved \u201cexhaustive search\u201d attacks on stream ciphers. In European Convention on Security and Detection, pages 161\u2013166. IET, May 1995.","DOI":"10.1049\/cp:19950490"},{"key":"3_CR50","doi-asserted-by":"crossref","unstructured":"Subhadeep Banik. Some results on Sprout. In INDOCRYPT 2015, volume 9462 of LNCS, pages 124\u2013139. Springer, 2015.","DOI":"10.1007\/978-3-319-26617-6_7"},{"key":"3_CR91","doi-asserted-by":"crossref","unstructured":"Alex Biryukov and Adi Shamir. Cryptanalytic time\/memory\/data tradeoffs for stream ciphers. In Tatsuaki Okamoto, editor, Advances in Cryptology \u2013 ASIACRYPT 2000, volume 1976 of Lecture Notes in Computer Science, pages 1\u201313, Kyoto, Japan, December 3\u20137, 2000. Springer.","DOI":"10.1007\/3-540-44448-3_1"},{"key":"3_CR201","unstructured":"\u0130mran Erg\u00fcler and Orhun Kara. A new approach to keystream based cryptosystems. In SASC 2008, Workshop Record,, pages 205\u2013221. SASC, 2008."},{"key":"3_CR203","doi-asserted-by":"crossref","unstructured":"Muhammed F. Esgin and Orhun Kara. Practical cryptanalysis of full Sprout with TMD tradeoff attacks. In Selected Areas in Cryptography - SAC 2015, pages 67\u201385, 2015.","DOI":"10.1007\/978-3-319-31301-6_4"},{"key":"3_CR234","doi-asserted-by":"crossref","unstructured":"Henri Gilbert, Matthew JB Robshaw, and Yannick Seurin. How to encrypt with the LPN problem. In International Colloquium on Automata, Languages, and Programming, pages 679\u2013690. Springer, 2008.","DOI":"10.1007\/978-3-540-70583-3_55"},{"key":"3_CR237","doi-asserted-by":"crossref","unstructured":"Jovan Dj. Gol\u00edc. Cryptanalysis of alleged A5 stream cipher. In Walter Fumy, editor, Advances in Cryptology \u2013 EUROCRYPT 97, volume 1233 of Lecture Notes in Computer Science, pages 239\u2013255. Springer, 1997.","DOI":"10.1007\/3-540-69053-0_17"},{"key":"3_CR249","doi-asserted-by":"crossref","unstructured":"Christoph G G\u00fcnther. A universal algorithm for homophonic coding. In Workshop on the Theory and Application of of Cryptographic Techniques, pages 405\u2013414. Springer, 1988.","DOI":"10.1007\/3-540-45961-8_37"},{"key":"3_CR265","doi-asserted-by":"crossref","unstructured":"Martin Hell, Thomas Johansson, Alexander Maximov, and Willi Meier. The grain family of stream ciphers. In New Stream Cipher Designs, pages 179\u2013190. Springer, 2008.","DOI":"10.1007\/978-3-540-68351-3_14"},{"issue":"3","key":"3_CR313","doi-asserted-by":"publisher","first-page":"1916","DOI":"10.3906\/elk-1311-54","volume":"24","author":"Orhun Kara","year":"2016","unstructured":"Orhun Kara, \u0130mran Erg\u00fcler, and Emin Anarim. A new security relation between information rate and state size of a keystream generator. Turkish Journal of Electrical Engineering & Computer Sciences, 24(3):1916\u20131929, 2016.","journal-title":"Turkish Journal of Electrical Engineering & Computer Sciences"},{"issue":"1","key":"3_CR314","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1109\/TC.2018.2851239","volume":"68","author":"Orhun Kara","year":"2019","unstructured":"Orhun Kara and Muhammed F. Esgin. On analysis of lightweight stream ciphers with keyed update. IEEE Trans. Computers, 68(1):99\u2013110, 2019.","journal-title":"IEEE Trans. Computers"},{"key":"3_CR321","doi-asserted-by":"crossref","unstructured":"Yahya S Khiabani and Shuangqing Wei. A joint shannon cipher and privacy amplification approach to attaining exponentially decaying information leakage. Information Sciences, 357:6\u201322, 2016.","DOI":"10.1016\/j.ins.2016.03.049"},{"key":"3_CR322","doi-asserted-by":"crossref","unstructured":"Yahya S Khiabani, Shuangqing Wei, Jian Yuan, and Jian Wang. Enhancement of secrecy of block ciphered systems by deliberate noise. IEEE Transactions on Information Forensics and Security, 7(5):1604\u20131613, 2012.","DOI":"10.1109\/TIFS.2012.2204983"},{"key":"3_CR355","doi-asserted-by":"crossref","unstructured":"Virginie Lallemand and Mar\u00eda Naya-Plasencia. Cryptanalysis of full Sprout. In Advances in Cryptology \u2013 CRYPTO 2015, volume 9215 of LNCS, pages 663\u2013682. Springer, 2015.","DOI":"10.1007\/978-3-662-47989-6_32"},{"key":"3_CR387","unstructured":"Subhamoy Maitra, Santanu Sarkar, Anubhab Baksi, and Pramit Dey. Key recovery from state information of Sprout: Application to cryptanalysis and fault attack. Cryptology ePrint Archive, Report 2015\/236."},{"key":"3_CR397","doi-asserted-by":"crossref","unstructured":"James L Massey. Some applications of source coding in cryptography. Transactions on Emerging Telecommunications Technologies, 5(4):421\u2013430, 1994.","DOI":"10.1002\/ett.4460050405"},{"key":"3_CR413","unstructured":"Miodrag J Mihaljevic. A framework for stream ciphers based on pseudorandomness, randomness and coding. In Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, pages 117\u2013139. IOS Press, Amsterdam, The Netherlands, 2009."},{"key":"3_CR414","doi-asserted-by":"crossref","unstructured":"Miodrag J Mihaljevi\u0107. An approach for light-weight encryption employing dedicated coding. In Global Communications Conference, 2012 IEEE, pages 874\u2013880. IEEE, 2012.","DOI":"10.1109\/GLOCOM.2012.6503223"},{"key":"3_CR418","doi-asserted-by":"crossref","unstructured":"Miodrag J Mihaljevi\u0107 and Hideki Imai. An approach for stream ciphers design based on joint computing over random and secret data. Computing, 85(1\u20132):153\u2013168, 2009.","DOI":"10.1007\/s00607-009-0035-x"},{"key":"3_CR419","unstructured":"Miodrag J Mihaljevi\u0107 and Hideki Imai. Employment of homophonic coding for improvement of certain encryption approaches based on the lpn problem. In Symmetric Key Encryption Workshop, SKEW, pages 16\u201317, 2011."},{"key":"3_CR420","doi-asserted-by":"crossref","unstructured":"Miodrag J Mihaljevi\u0107 and Fr\u00e9d\u00e9rique Oggier. Security evaluation and design elements for a class of randomised encryptions. IET Information Security, 13(1):36\u201347, 2019.","DOI":"10.1049\/iet-ifs.2017.0271"},{"issue":"2","key":"3_CR421","first-page":"52","volume":"2016","author":"Vasily Mikhalev","year":"2016","unstructured":"Vasily Mikhalev, Frederik Armknecht, and Christian M\u00fcller. On ciphers that continuously access the non-volatile key. IACR Transactions on Symmetric Cryptology, 2016(2):52\u201379, 2016. http:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/view\/565.","journal-title":"IACR Transactions on Symmetric Cryptology"},{"issue":"2","key":"3_CR422","doi-asserted-by":"publisher","first-page":"52","DOI":"10.46586\/tosc.v2016.i2.52-79","volume":"2016","author":"Vasily Mikhalev","year":"2017","unstructured":"Vasily Mikhalev, Frederik Armknecht, and Christian M\u00fcller. On ciphers that continuously access the non-volatile key. IACR Transactions on Symmetric Cryptology, 2016(2):52\u201379, 2017.","journal-title":"IACR Transactions on Symmetric Cryptology"},{"key":"3_CR452","doi-asserted-by":"crossref","unstructured":"Fr\u00e9d\u00e9rique Oggier and Miodrag J Mihaljevi\u0107. An information-theoretic security evaluation of a class of randomized encryption schemes. IEEE Transactions on Information Forensics and Security, 9(2):158\u2013168, 2014.","DOI":"10.1109\/TIFS.2013.2294763"},{"key":"3_CR503","doi-asserted-by":"crossref","unstructured":"Ronald L Rivest and Alan T Sherman. Randomized encryption techniques. In Advances in Cryptology, pages 145\u2013163. Springer, 1983.","DOI":"10.1007\/978-1-4757-0602-4_14"},{"key":"3_CR570","doi-asserted-by":"crossref","unstructured":"Jian Wang, Jiaqi Mu, Shuangqing Wei, Chunxiao Jiang, and Norman C Beaulieu. Statistical characterization of decryption errors in block-ciphered systems. IEEE Transactions on Communications, 63(11):4363\u20134376, 2015.","DOI":"10.1109\/TCOMM.2015.2474860"},{"issue":"4","key":"3_CR577","doi-asserted-by":"publisher","first-page":"636","DOI":"10.1109\/TIFS.2013.2248724","volume":"8","author":"Shuangqing Wei","year":"2013","unstructured":"Shuangqing Wei, Jian Wang, Ruming Yin, and Jian Yuan. Trade-off between security and performance in block ciphered systems with erroneous ciphertexts. IEEE Transactions on Information Forensics and Security, 8(4):636\u2013645, 2013.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"3_CR593","doi-asserted-by":"crossref","unstructured":"Bin Zhang and Xinxin Gong. Another tradeoff attack on Sprout-like stream ciphers. In ASIACRYPT 2015, volume 9453 of LNCS, pages 561\u2013585. Springer, 2015.","DOI":"10.1007\/978-3-662-48800-3_23"}],"container-title":["Security of Ubiquitous Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-10591-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T15:13:15Z","timestamp":1610637195000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-10591-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030105907","9783030105914"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-10591-4_3","relation":{},"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"15 January 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}