Probabilistic cycle detection for Schneie's solitaire keystream algorithm

Wiem Tounsi, Benjamin Justus, Nora Cuppens Boulahia, Frédéric Cuppen, Joaquin Garcia Alfaro

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Pencil-and-paper ciphers are plausible solutions that could provide lightweight protection to the communication of resource-constrained devices. A good example in this category is Schneier's Solitaire cipher. In this paper, we propose a probabilistic solution that is able to estimate Solitaire's keystream cycle length. We also present a variation of Solitaire's original design, and evaluate the resulting construction in terms of predictability. We conduct statistical randomness tests on both the original design and the modified version based on the NIST randomness test suite. The results show that our approach improves the randomness of original Solitaire's output sequences.

Original languageEnglish
Title of host publicationProceedings - 8th International Conference on Software Security and Reliability - Companion, SERE-C 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages113-120
Number of pages8
ISBN (Electronic)9781479958436
DOIs
Publication statusPublished - 17 Sept 2014
Externally publishedYes
Event8th International Conference on Software Security and Reliability - Companion, SERE-C 2014 - San Francisco, United States
Duration: 30 Jun 20142 Jul 2014

Publication series

NameProceedings - 8th International Conference on Software Security and Reliability - Companion, SERE-C 2014

Conference

Conference8th International Conference on Software Security and Reliability - Companion, SERE-C 2014
Country/TerritoryUnited States
CitySan Francisco
Period30/06/142/07/14

Keywords

  • Cryptography
  • Cycle Detection
  • ICT Security
  • Pencil-and-Paper Ciphers
  • Pseudo-Random Number Generators (PRNG)
  • Randomness Evaluation

Fingerprint

Dive into the research topics of 'Probabilistic cycle detection for Schneie's solitaire keystream algorithm'. Together they form a unique fingerprint.

Cite this