On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers

被引:3
|
作者
Paul, Goutam [1 ]
Ray, Souvik [1 ]
机构
[1] Indian Stat Inst, Kolkata 700108, India
关键词
Data complexity; Distinguisher; Distinguishing attack; Message recovery; Stream cipher;
D O I
10.1007/s10623-017-0391-z
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We revisit the different approaches used in the literature to estimate the data complexity of distinguishing attacks on stream ciphers and analyze their inter-relationships. In the process, we formally argue which approach is applicable (or not applicable) in what scenario. To our knowledge, this is the first kind of such an exposition. We also perform a rigorous statistical analysis of the message recovery attack that exploits a distinguisher and show that in practice there is a significant gap between the data complexities of a message recovery attack and the underlying distinguishing attack. This gap is not necessarily determined by a constant factor as a function of the false positive and negative rate, as one would expect. Rather this gap is also a function of the number of samples of the distinguishing attack. We perform a case study on RC4 stream cipher to demonstrate that the typical complexities for message recovery attack inferred in the literature are but under-estimates and the actual estimates are quite larger.
引用
收藏
页码:1211 / 1247
页数:37
相关论文
共 50 条
  • [41] On the security of the LILI family of stream ciphers against algebraic attacks
    Al-Hinai, Sultan Zayid
    Dawson, Ed
    Henricksen, Matt
    Simpson, Leonie
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2007, 4586 : 11 - +
  • [42] Prevention of Fault Attacks in Cellular Automata Based Stream Ciphers
    Jose, Jimmy
    Das, Sourav
    Chowdhury, Dipanwita Roy
    JOURNAL OF CELLULAR AUTOMATA, 2017, 12 (1-2) : 141 - 157
  • [43] Differential Random Fault Attacks on Certain CAESAR Stream Ciphers
    Wong, Kenneth Koon-Ho
    Bartlett, Harry
    Simpson, Leonie
    Dawson, Ed
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2019, 2020, 11975 : 297 - 315
  • [44] Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things
    He, Yu
    Wang, Gaoli
    Li, Wenshan
    Ren, Yizhi
    IEEE ACCESS, 2020, 8 : 20920 - 20930
  • [45] DISTINGUISHING ATTACKS ON BLOCK CIPHERS BY DIFFERENTIALS OF TWO-BLOCK TEXTS
    Denisov, O., V
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2020, (48): : 43 - 62
  • [46] Two linear distinguishing attacks on VMPC and RC4A and weakness of RC4 family of stream ciphers
    Maximov, A
    FAST SOFTWARE ENCRYPTION, 2005, 3557 : 342 - 358
  • [47] Guess-and-determine attacks on PANAMA-like stream ciphers
    Jiao, Lin
    Li, Yongqiang
    Hao, Yonglin
    IET INFORMATION SECURITY, 2018, 12 (06) : 484 - 497
  • [48] Improved fast correlation attacks on stream ciphers via convolutional codes
    Johansson, T
    Jönsson, F
    ADVANCES IN CRYPTOLOGY - EUROCRYPT'99, 1999, 1592 : 347 - 362
  • [49] Distributed Time-Memory Tradeoff Attacks on Ciphers (with Application to Stream Ciphers and Counter Mode)
    Heys, Howard M.
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 135 - 153
  • [50] A survey of divide and conquer attacks on certain irregularly clocked stream ciphers
    Dawson, E
    Simpson, L
    Golic, J
    CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, 2001, 20 : 165 - 185