On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers

被引:3
|
作者
Paul, Goutam [1 ]
Ray, Souvik [1 ]
机构
[1] Indian Stat Inst, Kolkata 700108, India
关键词
Data complexity; Distinguisher; Distinguishing attack; Message recovery; Stream cipher;
D O I
10.1007/s10623-017-0391-z
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We revisit the different approaches used in the literature to estimate the data complexity of distinguishing attacks on stream ciphers and analyze their inter-relationships. In the process, we formally argue which approach is applicable (or not applicable) in what scenario. To our knowledge, this is the first kind of such an exposition. We also perform a rigorous statistical analysis of the message recovery attack that exploits a distinguisher and show that in practice there is a significant gap between the data complexities of a message recovery attack and the underlying distinguishing attack. This gap is not necessarily determined by a constant factor as a function of the false positive and negative rate, as one would expect. Rather this gap is also a function of the number of samples of the distinguishing attack. We perform a case study on RC4 stream cipher to demonstrate that the typical complexities for message recovery attack inferred in the literature are but under-estimates and the actual estimates are quite larger.
引用
收藏
页码:1211 / 1247
页数:37
相关论文
共 50 条
  • [1] On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers
    Goutam Paul
    Souvik Ray
    Designs, Codes and Cryptography, 2018, 86 : 1211 - 1247
  • [2] An overview of distinguishing attacks on stream ciphers
    Hell, Martin
    Johansson, Thomas
    Brynielsson, Lennart
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2009, 1 (01): : 71 - 94
  • [3] An overview of distinguishing attacks on stream ciphers
    Martin Hell
    Thomas Johansson
    Lennart Brynielsson
    Cryptography and Communications, 2009, 1 : 71 - 94
  • [4] Rewriting variables: The complexity of fast algebraic attacks on stream ciphers
    Hawkes, P
    Rose, GG
    ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 390 - 406
  • [5] Linear attacks on stream ciphers
    Hell M.
    Johansson T.
    Cryptology and Information Security Series, 2011, 7 : 55 - 85
  • [6] Correlation attacks on stream ciphers
    Penzhorn, WT
    AFRICON '96 - 1996 IEEE AFRICON : 4TH AFRICON CONFERENCE IN AFRICA, VOLS I & II: ELECTRICAL ENERGY TECHNOLOGY; COMMUNICATION SYSTEMS; HUMAN RESOURCES, 1996, : 1093 - 1098
  • [7] Distinguishing attacks on stream ciphers based on arrays of pseudo-random words
    Keller, Nathan
    Miller, Stephen D.
    INFORMATION PROCESSING LETTERS, 2010, 110 (04) : 129 - 132
  • [8] Low Data Complexity Inversion Attacks on Stream Ciphers via Truncated Compressed Preimage Sets
    Zhong, Xiao
    Wang, Mingsheng
    Zhang, Bin
    Wu, Shengbao
    INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 131 - 147
  • [9] New correlation attacks on stream ciphers
    Penzhorn, WT
    Bruwer, C
    2002 IEEE AFRICON, VOLS 1 AND 2: ELECTROTECHNOLOGICAL SERVICES FOR AFRICA, 2002, : 203 - 208
  • [10] FAST CORRELATION ATTACKS ON STREAM CIPHERS
    MEIER, W
    STAFFELBACH, O
    LECTURE NOTES IN COMPUTER SCIENCE, 1988, 330 : 301 - 314