On the security of IV dependent stream ciphers

被引:0
|
作者
Berbain, Come [1 ]
Gilbert, Henri [1 ]
机构
[1] France Telecom R&D, 38-40 Rue Gen Leclerc, F-92794 Issy Les Moulineaux 9, France
来源
FAST SOFTWARE ENCRYPTION | 2007年 / 4593卷
关键词
stream cipher; PRNG; IV setup; provable security;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Almost all the existing stream ciphers are using two inputs: a secret key and an initial value (IV). However recent attacks indicate that designing a secure IV-dependent stream cipher and especially the key and IV setup component of such a cipher remains a difficult task. In this paper we first formally establish the security of a well known generic construction for deriving an IV-dependent stream cipher, namely the composition of a key and IV setup pseudo-random function (PRF) with a keystream generation pseudo-random number generator (PRNG). We then present a tree-based construction allowing to derive a IV-dependent stream cipher from a PRNG for a moderate cost that can be viewed as a subcase of the former generic construction. Finally we show that the recently proposed stream cipher QUAD [3] uses this tree-based construction and that consequently the security proof for QUAD's keystream generation part given in [3] can be extended to incorporate the key and IV setup.
引用
收藏
页码:254 / +
页数:4
相关论文
共 50 条
  • [1] Enhancement of Stream Ciphers Security Using DNA
    Ramesh, B.
    Bhavani, S. A.
    Muralidhar, P.
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGIES, IC3T 2015, VOL 3, 2016, 381 : 637 - 643
  • [2] A framework for chosen IV statistical analysis of stream ciphers
    Englund, Hakan
    Johansson, Thomas
    Turan, Meltem Soenmez
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 268 - +
  • [3] High-security optical integrated stream ciphers
    Zhang, SQ
    Karim, RA
    OPTICAL ENGINEERING, 1999, 38 (01) : 20 - 24
  • [4] Provable security against generic attacks on stream ciphers
    Moch, Alexander
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2023, 17 (01)
  • [5] On the (In)security of stream ciphers based on arrays and modular addition
    Paul, Souradyuti
    Preneel, Bart
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2006, 2006, 4284 : 69 - +
  • [6] Security of jump controlled sequence generators for stream ciphers
    Helleseth, Tor
    Jansen, Cees J. A.
    Khazaei, Shahram
    Kholosha, Alexander
    SEQUENCES AND THEIR APPLICATIONS - SETA 2006, 2006, 4086 : 141 - 152
  • [7] Information Security Enhancement by Increasing Randomness of Stream Ciphers in GSM
    Prajapat, Ram Prakash
    Bhadada, Rajesh
    Choudhary, Arjun
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (04) : 711 - 717
  • [8] On the security of the LILI family of stream ciphers against algebraic attacks
    Al-Hinai, Sultan Zayid
    Dawson, Ed
    Henricksen, Matt
    Simpson, Leonie
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2007, 4586 : 11 - +
  • [9] STREAM CIPHERS
    PIPER, F
    LECTURE NOTES IN COMPUTER SCIENCE, 1983, 149 : 181 - 188
  • [10] Enhancing CAN Security by Means of Lightweight Stream-Ciphers and Protocols
    Boudguiga, Aymen
    Letailleur, Jerome
    Sirdey, Renaud
    Klaudel, Witold
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2019, 2019, 11699 : 235 - 250