On the security of IV dependent stream ciphers

被引:0
|
作者
Berbain, Come [1 ]
Gilbert, Henri [1 ]
机构
[1] France Telecom R&D, 38-40 Rue Gen Leclerc, F-92794 Issy Les Moulineaux 9, France
来源
FAST SOFTWARE ENCRYPTION | 2007年 / 4593卷
关键词
stream cipher; PRNG; IV setup; provable security;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Almost all the existing stream ciphers are using two inputs: a secret key and an initial value (IV). However recent attacks indicate that designing a secure IV-dependent stream cipher and especially the key and IV setup component of such a cipher remains a difficult task. In this paper we first formally establish the security of a well known generic construction for deriving an IV-dependent stream cipher, namely the composition of a key and IV setup pseudo-random function (PRF) with a keystream generation pseudo-random number generator (PRNG). We then present a tree-based construction allowing to derive a IV-dependent stream cipher from a PRNG for a moderate cost that can be viewed as a subcase of the former generic construction. Finally we show that the recently proposed stream cipher QUAD [3] uses this tree-based construction and that consequently the security proof for QUAD's keystream generation part given in [3] can be extended to incorporate the key and IV setup.
引用
收藏
页码:254 / +
页数:4
相关论文
共 50 条
  • [21] On Provable Security of wPRF-Based Leakage-Resilient Stream Ciphers
    Skorski, Maciej
    PROVABLE SECURITY, PROVSEC 2015, 2015, 9451 : 391 - 411
  • [22] The Key and IV Setup of the Stream Ciphers HC-256 and HC-128
    Liu, Yunyi
    Qin, Tuanfa
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 430 - 433
  • [23] Linear attacks on stream ciphers
    Hell M.
    Johansson T.
    Cryptology and Information Security Series, 2011, 7 : 55 - 85
  • [24] Nonlinear Equivalence of Stream Ciphers
    Ronjom, Sondre
    Cid, Carlos
    FAST SOFTWARE ENCRYPTION, 2010, 6147 : 40 - +
  • [25] Observer Attack on Stream Ciphers
    Anantharaman, Ramachandran
    Sule, Virendra
    IFAC PAPERSONLINE, 2022, 55 (30): : 13 - 18
  • [26] Special Issue on Stream Ciphers
    Maitra, Subhamoy
    Sarkar, Palash
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2012, 4 (3-4): : 145 - 146
  • [27] FPGA Implementations of 256-Bit SNOW Stream Ciphers for Postquantum Mobile Security
    Bahadori, Milad
    Jarvinen, Kimmo
    Niemi, Valtteri
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2021, 29 (11) : 1943 - 1954
  • [28] Correlation attacks on stream ciphers
    Penzhorn, WT
    AFRICON '96 - 1996 IEEE AFRICON : 4TH AFRICON CONFERENCE IN AFRICA, VOLS I & II: ELECTRICAL ENERGY TECHNOLOGY; COMMUNICATION SYSTEMS; HUMAN RESOURCES, 1996, : 1093 - 1098
  • [29] The Research of Modern Stream Ciphers
    Gorbenko, Ivan
    Kuznetsov, Alexandr
    Lutsenko, Maria
    Ivanenko, Dmytro
    2017 4TH INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS-SCIENCE AND TECHNOLOGY (PIC S&T), 2017, : 207 - 210
  • [30] Stream ciphers for GSM networks
    Lo, CC
    Chen, YJ
    ICC 2000: IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CONFERENCE RECORD, VOLS 1-3: GLOBAL CONVERGENCE THROUGH COMMUNICATIONS, 2000, : 80 - 84