Distinguishing attack on SN3 stream cipher

被引:1
|
作者
Orumiehchi, Mohammad Ali [1 ]
Mohebbipoor, S. Fahimeh [1 ]
机构
[1] Zaeim Elect Ind R&D Dept, Tehran, Brazil
关键词
D O I
10.1109/IIH-MSP.2008.198
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
SN3 is a synchronous stream cipher uses keys up to 768-byte. The cipher is constructed as an array base generator in which each key stream word can be considered as a linear combination of some array contents. While the cipher has not been analyzed yet, we show that there is a significance correlation between output key streams and by using this result we mount a distinguishing attack on SN3 stream cipher with having about 2(2.82) words of the output sequence.
引用
收藏
页码:1392 / 1395
页数:4
相关论文
共 50 条
  • [31] Improved Guess and Determine attack on the MASHA stream cipher
    Ding, Lin
    Gu, Dawu
    Wang, Lei
    Jin, Chenhui
    Guan, Jie
    SCIENCE CHINA-INFORMATION SCIENCES, 2021, 64 (09)
  • [32] Probabilistic algebraic attack on plantlet lightweight stream cipher
    Sharma, Dheeraj Kumar
    Pandey, Rajoo
    Chatterjee, Tapas
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2023, 48 (04):
  • [33] Improved Heuristic Guess and Determine attack On SNOW 3G Stream Cipher
    Nia, Mohammad Sadegh Nemati
    Eghlidos, Taraneh
    2014 7TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2014, : 972 - 976
  • [34] Distinguishing Attack on CPB-Based Cipher COSB-128
    Phuc, Tran Song Dat
    Lee, Changhoon
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (01): : 355 - 360
  • [35] ON DISTINGUISHING ATTACK AGAINST THE REDUCED VERSION OF THE CIPHER NLSv2
    Brasko, Michal
    Boor, Jaroslav
    TATRACRYPT '12, 2012, 53 : 21 - 32
  • [36] Cube attack on stream cipher E0: revisited
    Deepthi K.K.C.
    Singh K.
    Konduru S.K.
    International Journal of Information Technology, 2022, 14 (5) : 2575 - 2584
  • [37] An algebraic attack to the Bluetooth stream cipher E0
    La Scala, Roberto
    Polese, Sergio
    Tiwari, Sharwan K.
    Visconti, Andrea
    FINITE FIELDS AND THEIR APPLICATIONS, 2022, 84
  • [38] Optimal combined distinguisher of stream cipher with multiple independent distinguishing characters
    Gao, H.-Y., 1600, Editorial Board of Journal on Communications (33):
  • [39] Simulated Leakage Power Analysis Attack of the Trivium Stream Cipher
    Palma, Kenneth
    Moll, Francesc
    PROCEEDINGS OF THE 37TH CONFERENCE ON DESIGN OF CIRCUITS AND INTEGRATED SYSTEMS (DCIS 2022), 2022, : 191 - 196
  • [40] PUCKERED HEXAGONAL NETS IN 2-INFINITY[SN3/3AS3/3-] AND 2-INFINITY[SN3/3SB3/3-]
    LII, KH
    HAUSHALTER, RC
    JOURNAL OF SOLID STATE CHEMISTRY, 1987, 67 (02) : 374 - 378