Features of implementation and assessment of Rabbit cipher cryptographically strong.
Abstract
The paper considers the Rabbit cipher algorithm, its security and performance properties. The features of the Rabbit cipher implementation, which are used to encrypt and decrypt binary data, are presented. The Rabbit algorithm is realized in C++. It is shown that the main advantage of using the Rabbit algorithm as a stream cipher is the combination of speed and efficiency (security level). The cryptographic strength of the Rabbit cipher under a brute-force attack is investigated, the time to brute force the key (time of information secrecy) is calculated, provided that the algorithm is perfect. It has been proven that, taking into account Moore's law, the cryptanalysis time is reduced by more than an order of magnitude
References
Menezes A.J., van Oorschot P.C., Vanstone S.A. Handbook of Applied Cryptography, CRC Press, 1997, 794 р.
The eSTREAM Project, 2004, URL: http://www.ecrypt.eu.org (Last accessed: 25.11.2020).
Cryptography Research and Evaluation Committees, CRYPTREC, 2005. URL: http://www.cryptrec.go.jp (Last accessed: 25.11.2020).
Gorbenko I., Kuznetsov A., Gorbenko Y., Vdovenko S., Tymchenko V., Lutsenko M. Studies on statistical analysis and performance evaluation for some stream ciphers. In International Journal of Computing, 18(1) 2019, 82-88
The eSTREAM Project eSTREAM Phase 3. Rabbit (Portfolio Profile 1). URL: http://www.ecrypt.eu.org (Last accessed: 25.11.2020).
Murtaza A., Pirzada S. J. H., Jianwei L. A New Symmetric Key Encryption Algorithm With Higher Performance. In 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies. Sukkur, Pakistan, 30-31 January 2019.
Boesgaard M., Vesterager M., Pedersen T., Christiansen J., and Scavenius O. Rabbit: A New High-Performance Stream Cipher. URL: https://web.archive.org/web/20050629021516/http://www.cryptico.com/Files/filer/rabbit_fse.pdf (Last accessed: 25.11.2020).
De Canni`ere C., Lano J., Preneel B. Comments on the Rediscovery of Time Memory Data Tradeoffs. URL: https://www.ecrypt.eu.org/stream/papersdir/040.pdf (Last accessed: 25.11.2020).
Schneier B. Applied Cryptography: Protocols, Algorithms, and Source Code in C. 2nd ed. Kyiv : Dialektika, 2016. 1040 p.
Polovynko I., Kril T. The Physics of Optical Computers. Electronics and information technologies. 2014. Is. 4. P. 3–23.
Abstract views: 145 PDF Downloads: 190