On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers

被引:3
|
作者
Paul, Goutam [1 ]
Ray, Souvik [1 ]
机构
[1] Indian Stat Inst, Kolkata 700108, India
关键词
Data complexity; Distinguisher; Distinguishing attack; Message recovery; Stream cipher;
D O I
10.1007/s10623-017-0391-z
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We revisit the different approaches used in the literature to estimate the data complexity of distinguishing attacks on stream ciphers and analyze their inter-relationships. In the process, we formally argue which approach is applicable (or not applicable) in what scenario. To our knowledge, this is the first kind of such an exposition. We also perform a rigorous statistical analysis of the message recovery attack that exploits a distinguisher and show that in practice there is a significant gap between the data complexities of a message recovery attack and the underlying distinguishing attack. This gap is not necessarily determined by a constant factor as a function of the false positive and negative rate, as one would expect. Rather this gap is also a function of the number of samples of the distinguishing attack. We perform a case study on RC4 stream cipher to demonstrate that the typical complexities for message recovery attack inferred in the literature are but under-estimates and the actual estimates are quite larger.
引用
收藏
页码:1211 / 1247
页数:37
相关论文
共 50 条
  • [31] Applying cube attacks to stream ciphers in realistic scenarios
    Itai Dinur
    Adi Shamir
    Cryptography and Communications, 2012, 4 : 217 - 232
  • [32] LFSR based stream ciphers are vulnerable to power attacks
    Burman, Sanjay
    Nlukhopadhyay, Debdeep
    Veezhinathan, Kamakoti
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 384 - +
  • [33] Correlation attacks on stream ciphers and related decoding problems
    Johansson, T
    1998 INFORMATION THEORY WORKSHOP - KILLARNEY, IRELAND, 1998, : 156 - 157
  • [34] Applying cube attacks to stream ciphers in realistic scenarios
    Dinur, Itai
    Shamir, Adi
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2012, 4 (3-4): : 217 - 232
  • [35] Fast Discrete Fourier Spectra Attacks on Stream Ciphers
    Gong, Guang
    Ronjom, Sondre
    Helleseth, Tor
    Hu, Honggang
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (08) : 5555 - 5565
  • [36] Open problems related to algebraic attacks on stream ciphers
    Canteaut, Anne
    CODING AND CRYPTOGRAPHY, 2006, 3969 : 120 - 134
  • [37] Fast algebraic attacks on stream ciphers with linear feedback
    Courtois, NT
    ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 : 176 - 194
  • [38] Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers
    Dunkelman, Orr
    Keller, Nathan
    INFORMATION PROCESSING LETTERS, 2008, 107 (05) : 133 - 137
  • [39] Algebraic attacks on a class of stream ciphers with unknown output function
    N. Rajesh Pillai
    S. S. Bedi
    Designs, Codes and Cryptography, 2013, 69 : 317 - 330
  • [40] Algebraic attacks on a class of stream ciphers with unknown output function
    Pillai, N. Rajesh
    Bedi, S. S.
    DESIGNS CODES AND CRYPTOGRAPHY, 2013, 69 (03) : 317 - 330