The Dragon Stream Cipher: Design, Analysis, and Implementation Issues

  • Authors:
  • Ed Dawson;Matt Henricksen;Leonie Simpson

  • Affiliations:
  • Information Security Research Centre, Queensland University of Technology, Brisbane, Australia Qld 4001;Institute for Infocomm Research, A*STAR, Singapore;Information Security Research Centre, Queensland University of Technology, Brisbane, Australia Qld 4001

  • Venue:
  • New Stream Cipher Designs
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Dragon is a word-based stream cipher. It was submitted to the eSTREAM project in 2005 and has advanced to Phase 3 of the software profile. This paper discusses the Dragon cipher from three perspectives: design, security analysis and implementation. The design of the cipher incorporates a single word-based non-linear feedback shift register and a non-linear filter function with memory. This state is initialized with 128- or 256-bit key-IV pairs. Each clock of the stream cipher produces 64 bits of keystream, using simple operations on 32-bit words. This provides the cipher with a high degree of efficiency in a wide variety of environments, making it highly competitive relative to other symmetric ciphers. The components of Dragon were designed to resist all known attacks. Although the design has been open to public scrutiny for several years, the only published attacks to date are distinguishing attacks which require keystream lengths greatly exceeding the stated 264bit maximum permitted keystream length for a single key-IV pair.