A New Stream Cipher: Dicing
In this paper, we will propose a new synchronous stream cipher named DICING, which can be viewed as a clock-controlled one but with a new mechanism of altering steps. It has satisfactory performance and there have not been found weakness for the known attacks, the key sizes can be 128bits and 256bits respectively.
š” Research Summary
The paper proposes a new synchronous stream cipher called DICING. Its main novelty lies in replacing the traditional linearāfeedback shift register (LFSR) with a āprojectorā ā a state element that evolves by multiplication in a binary extension field GF(2^m) (m = 126, 127, 128, etc.) rather than by bitāwise shift. Two projectors (Īā and Īā) together with two 8ābit counters (called ādicesā, Dā² and Dā³) form the controller. The dice values are simply the lowāorder 8 bits of the states of Īā and Īā and are used to dynamically control the update steps of two additional projectors (Īā and Īā) that generate the keystream components Ļ and Ļ. This creates a variableāstep clockācontrolled mechanism that differs from classic shrinking or stopāandāgo generators.
Key and IV handling is deliberately complex. The secret key K (128āÆbits or 256āÆbits) is split into 8ābyte words, subjected to two linear transformations A and B, XORed, and then used to derive a keyādependent Sābox Sā. A further linear diffusion L is applied to four 32ābit words, producing a set of nonālinear mappings that are later used in the initialization. The IV, 32āÆbytes long, is mixed with a constant derived from the integer part of 57Ā·e and with four fixed 32ābyte strings (ξāā¦Ī¾ā). The result of this mixing initializes the four projector states (α, β, Ļ, Ļ) and two 16ābyte buffers u and v. A special rule resets Ļ and Ļ if the dice value becomes zero during initialization.
Keystream generation proceeds in two phases per cycle: an āupdatingā phase where all four projectors and both dice are advanced according to the recurrence relations (2.2)ā(2.4), and a ācombiningā phase where the buffers u and v are XORed, combined with the current dice values, and finally output as a 128ābit block zā. The authors claim a throughput of 10 cycles per byte (ā160 cycles per 128ābit block) on a 32ābit Windows platform with an AMD Athlon 64Ć2 3600+ CPU compiled by Borland C++ 5.0. Reported initialization costs are 5āÆ200 cycles for the key setup and 2āÆ280 cycles for the IV setup.
The security analysis focuses on period length and resistance to known attacks. Because the projectors are driven by primitive polynomials, their individual periods are 2¹²ā¶ā1, 2¹²ā·ā1, and 2¹²āøā1. By combining them, the authors derive an overall keystream period on the order of 2³āøā° (equations 3.1ā3.6). They argue that the dynamic, keyādependent dice control makes correlation, algebraic, and distinguishing attacks infeasible, as the attacker cannot obtain the necessary correlation equations. They also claim immunity to timeāmemoryādata tradeāoff, guessāandādetermine, chosenāIV, collision, and inversion attacks, and report no observable timing variations in their reference implementation.
Despite these claims, the paper lacks rigorous proofs. The period analysis assumes independence of the component periods without addressing possible common factors introduced by the combining function. No formal security model (e.g., PRF, INDāCPA) is presented, and the resistance to modern algebraic attacks (e.g., Grƶbnerābasis methods) is not quantified. The keyādependent Sābox construction is described only at a high level, leaving open the possibility of weak Sāboxes for certain keys. Sideāchannel resistance (timing, power, electromagnetic) is merely mentioned as āno remarkable gaps,ā without systematic measurement.
Implementation details are sparse. The performance numbers are based on an outdated compiler and CPU; no comparison with contemporary hardware (e.g., ARM CortexāA78, Intel AVXā512) is provided. The code is not released, making reproducibility difficult. Moreover, the algorithmās complexity (multiple field multiplications, Sābox lookāups, matrix transpositions) may lead to higher constant factors on modern architectures than the claimed 2Ć speedāup over AES.
The paper also discusses reduced versions and variants, such as omitting one or both dice, simplifying the combining function, or replacing the four projectors with a single 256ābit projector. While these variants may improve speed, the authors provide no security analysis for them, leaving open the question of whether the reductions introduce exploitable linearities.
In summary, DICING introduces an interesting conceptāfieldāmultiplicationābased projectors controlled by dynamic diceāto break the linearity inherent in LFSRābased stream ciphers. However, the design is intricate, the security arguments are largely heuristic, and the implementation claims are not substantiated on modern platforms. For DICING to be considered for standardization or practical deployment, a thorough cryptanalytic evaluation (including algebraic, differential, and sideāchannel analyses) and a reference implementation with openāsource code and benchmarked performance on current hardware would be essential.
Comments & Academic Discussion
Loading comments...
Leave a Comment