Ciphers with key-dependent structures have been investigated and are generally based on Feistel networks. Heraclitus, however, is based on mutually clocked shift registers. Ciphers of this type have been extensively analysed, and published attacks on them will be infeasible against any instance of Heraclitus.
The speed and security of Heraclitus makes it suitable as a session cipher, that is, an instance is generated at key exchange and used for one session.
Category / Keywords: secret-key cryptography / stream ciphers Date: received 12 Apr 2010 Contact author: Bernard Colbert at telstra com Available format(s): PDF | BibTeX Citation Version: 20100416:222234 (All versions of this report) Short URL: ia.cr/2010/203 Discussion forum: Show discussion | Start new discussion