Skip to main content

Advertisement

Springer Nature Link
Log in
Menu
Find a journal Publish with us Track your research
Search
Saved research
Cart
  1. Home
  2. Selected Areas in Cryptography
  3. Conference paper

Rekeying Issues in the MUGI Stream Cipher

  • Conference paper
  • pp 175–188
  • Cite this conference paper
Save conference paper
View saved research
Selected Areas in Cryptography (SAC 2005)
Rekeying Issues in the MUGI Stream Cipher
  • Matt Henricksen18 &
  • Ed Dawson18 

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3897))

Included in the following conference series:

  • International Workshop on Selected Areas in Cryptography
  • 1713 Accesses

  • 4 Citations

Abstract

MUGI [15] is a word-based stream cipher designed for 64-bit architectures. It uses a 128-bit master key and a 128-bit initialization vector to populate a large non-linear feedback shift register (NLFSR) and additional non-linear state (NLS). In standard benchmarks on 32-bit processors, MUGI suffers from poor key agility because it is implemented on an architecture for which it is not designed, and because its NLFSR is too large relative to the size of its master key. This paper proposes a variant of MUGI, entitled MUGI-M, to enhance key agility, and concludes with an analysis of its security and performance characteristics.

Download to read the full chapter text

Chapter PDF

Similar content being viewed by others

Improving algebraic attacks on stream ciphers based on linear feedback shift register over \(\mathbb {F}_{2^k}\)

Article 05 May 2016

New Key Recovery Attack on the MICKEY Family of Stream Ciphers

Chapter © 2019

Count Corruptions, Not Users: Improved Tightness for Signatures, Encryption and Authenticated Key Exchange

Chapter © 2025

Explore related subjects

Discover the latest articles, books and news in related subjects, suggested using machine learning.
  • Computer Crime
  • Cryptology
  • DNA computing and cryptography
  • Lab-on-a-Chip
  • Quantum Communications and Cryptography
  • Reverse engineering
  • Lightweight Cryptographic Algorithms for Secure IoT Systems

References

  1. Anonymous. RC4 algorithm revealed. Posting to sci.crypt usenet group (September 14, 1994), Available at: ftp://idea.sec.dsi.unimi.it/pub/security/crypt/code/rc4.revealed.gz

  2. Biryukov, A., Shamir, A.: Analysis of the non-linear part of MUGI. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 320–329. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  3. Boesgaard, M., Vesterager, M., Pedersen, T., Christiansen, J., Scavenius, O.: Rabbit: a new high-performance stream cipher. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 307–329. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  4. Chen, K., Henricksen, M., Simpson, L., Millian, W., Dawson, E.: Dragon: A fast word based cipher. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 33–50. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Daemen, J., Clapp, C.: Fast hashing and stream encryption with PANAMA. In: Vaudenay, S. (ed.) FSE 1998. LNCS, vol. 1372, pp. 60–74. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  6. Daemen, J., Rijmen, V.: Rijndael. In: Proceedings from the First Advanced Encryption Standard Candidate Conference, National Institute of Standards and Technology (NIST) (August 1998), Available at: http://csrc.nist.gov/encryption/aes/

  7. Dawson, E., Carter, G., Gustafson, H., Henricksen, M., Millan, W., Simpson, L.: Evaluation of the MUGI psuedo-random number generator. Technical report, CRYPTREC, Information Technology Promotion Agency (IPA), Tokyo, Japan (2002), Available at: www.ipa.go.jp/security/enc/CRYPTREC/fy15/doc/1035_IPA-MUGI_report_final.pdf

  8. Ekdahl, P., Johansson, T.: Snow - a new stream cipher (2000), Available at: http://www.it.lth.se/cryptology/snow/

  9. Boesgaard, M., Vesterager, M., Pedersen, T., Christiansen, J., Scavenius, O.: Rabbit: A new high-performance stream cipher. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 307–329. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  10. Golic, J.: Security evaluation of MUGI. Technical report, CRYPTREC, Information Technology Promotion Agency (IPA), Japan, Tokyo (2002)

    Google Scholar 

  11. Halevi, S., Coppersmith, D., Jutla, C.: Scream: A software-efficient stream cipher. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 195–209. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  12. Mihaeljevic, M.: Report on security evaluation of MUGI stream cipher. Technical report, CRYPTREC, Information Technology Promotion Agency (IPA), Tokyo, Japan (2002)

    Google Scholar 

  13. Rose, G., Hawkes, P.: Turing: a fast stream cipher. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 290–306. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  14. Watanabe, D., Furuya, S., Yoshida, H., Takaragi, K.: MUGI psuedorandom number generator, self evaluation (2001), Available at: http://www.sdl.hitachi.co.jp/crypto/mugi/index-e.html

  15. Watanabe, D., Furuya, S., Yoshida, H., Takaragi, K., Preneel, B.: A new keystream generator MUGI. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 179–194. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  16. Wu, H.: A New Stream Cipher HC-256 (2004), Available at: http://eprint.iacr.org/2004/092.pdf

Download references

Author information

Authors and Affiliations

  1. Information Security Institute, Queensland University of Technology, GPO Box 2434, Brisbane, Queensland, 4001, Australia

    Matt Henricksen & Ed Dawson

Authors
  1. Matt Henricksen
    View author publications

    Search author on:PubMed Google Scholar

  2. Ed Dawson
    View author publications

    Search author on:PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Interdisciplinary Institute for BroadBand Technology (IBBT), Belgium

    Bart Preneel

  2. Department of Electrical and Computer Engineering, Queen’s University Kingston, K7L 3N6, Kingston, Ontario, Canada

    Stafford Tavares

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Henricksen, M., Dawson, E. (2006). Rekeying Issues in the MUGI Stream Cipher. In: Preneel, B., Tavares, S. (eds) Selected Areas in Cryptography. SAC 2005. Lecture Notes in Computer Science, vol 3897. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11693383_12

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/11693383_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-33108-7

  • Online ISBN: 978-3-540-33109-4

  • eBook Packages: Computer ScienceComputer Science (R0)Springer Nature Proceedings Computer Science

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • stream cipher
  • MUGI
  • MUGI-M
  • key initialization
  • key agility

Publish with us

Policies and ethics

Search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Footer Navigation

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Journal finder
  • Publish your research
  • Language editing
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our brands

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Discover

Corporate Navigation

  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Legal notice
  • Cancel contracts here

162.0.217.198

Not affiliated

Springer Nature

© 2026 Springer Nature