Distinguishing attack on SN3 stream cipher

被引:1
|
作者
Orumiehchi, Mohammad Ali [1 ]
Mohebbipoor, S. Fahimeh [1 ]
机构
[1] Zaeim Elect Ind R&D Dept, Tehran, Brazil
关键词
D O I
10.1109/IIH-MSP.2008.198
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
SN3 is a synchronous stream cipher uses keys up to 768-byte. The cipher is constructed as an array base generator in which each key stream word can be considered as a linear combination of some array contents. While the cipher has not been analyzed yet, we show that there is a significance correlation between output key streams and by using this result we mount a distinguishing attack on SN3 stream cipher with having about 2(2.82) words of the output sequence.
引用
收藏
页码:1392 / 1395
页数:4
相关论文
共 50 条
  • [1] Distinguishing attack on the stream cipher Sosemanuk
    Li, Shunbo
    Hu, Yupu
    Wang, Yan
    Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University, 2012, 33 (02): : 259 - 262
  • [2] Distinguishing attack on stream cipher HC-256'
    Li, S.-B. (shunboli@163.com), 2012, Science Press (34):
  • [3] A new distinguishing and key recovery attack on NGG stream cipher
    Aleksandar Kircanski
    Rabeah Al-Zaidy
    Amr M. Youssef
    Cryptography and Communications, 2009, 1 : 269 - 282
  • [4] A new distinguishing and key recovery attack on NGG stream cipher
    Kircanski, Aleksandar
    Al-Zaidy, Rabeah
    Youssef, Amr M.
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2009, 1 (02): : 269 - 282
  • [5] ANN Based Distinguishing Attack on RC4 Stream Cipher
    Bhateja, Ashok K.
    Din, Maiya
    PROCEEDINGS OF SEVENTH INTERNATIONAL CONFERENCE ON BIO-INSPIRED COMPUTING: THEORIES AND APPLICATIONS (BIC-TA 2012), VOL 2, 2013, 202 : 101 - 109
  • [6] Differential Distinguishing attack on the Shannon Stream Cipher Based on Fault Analysis
    Hassanzadeh, Mehdi M.
    Parker, Matthew G.
    Helleseth, Tor
    Salehani, Y. Esmaeili
    Abyaneh, Mohammad R. Sohizadeh
    2008 INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS, VOLS 1 AND 2, 2008, : 671 - +
  • [7] Distinguishing attacks on the stream cipher Py
    Paul, Souradyuti
    Preneel, Bart
    Sekar, Gautham
    FAST SOFTWARE ENCRYPTION, 2006, 4047 : 405 - 421
  • [8] A distinguishing attack on a fast software-implemented RC4-like stream cipher
    Tsunoo, Yukiyasu
    Saito, Teruo
    Kubo, Hiroyasu
    Suzaki, Tomoyasu
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2007, 53 (09) : 3250 - 3255
  • [9] A New Attack on the LEX Stream Cipher
    Dunkelman, Orr
    Keller, Nathan
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008, 2008, 5350 : 539 - +
  • [10] Improved Attack on WG Stream Cipher
    Mirzaei, Arash
    Dakhilalian, Mohammad
    Modarres-Hashemi, Mahmoud
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (04): : 45 - 52