On the security of IV dependent stream ciphers

被引:0
|
作者
Berbain, Come [1 ]
Gilbert, Henri [1 ]
机构
[1] France Telecom R&D, 38-40 Rue Gen Leclerc, F-92794 Issy Les Moulineaux 9, France
来源
FAST SOFTWARE ENCRYPTION | 2007年 / 4593卷
关键词
stream cipher; PRNG; IV setup; provable security;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Almost all the existing stream ciphers are using two inputs: a secret key and an initial value (IV). However recent attacks indicate that designing a secure IV-dependent stream cipher and especially the key and IV setup component of such a cipher remains a difficult task. In this paper we first formally establish the security of a well known generic construction for deriving an IV-dependent stream cipher, namely the composition of a key and IV setup pseudo-random function (PRF) with a keystream generation pseudo-random number generator (PRNG). We then present a tree-based construction allowing to derive a IV-dependent stream cipher from a PRNG for a moderate cost that can be viewed as a subcase of the former generic construction. Finally we show that the recently proposed stream cipher QUAD [3] uses this tree-based construction and that consequently the security proof for QUAD's keystream generation part given in [3] can be extended to incorporate the key and IV setup.
引用
收藏
页码:254 / +
页数:4
相关论文
共 50 条
  • [41] PRIVACY SECURITY AND CIPHERS
    SANDEK, L
    DATA PROCESSOR-WHITE PLAINS, 1978, 21 (01): : 2 - 6
  • [42] Black-box security of stream ciphers under the quantum algorithm for linear systems of equations
    Cezary Pilaszewicz
    Marian Margraf
    Discover Computing, 28 (1)
  • [43] On the use of expansion series for stream ciphers
    Diem, Claus
    LMS JOURNAL OF COMPUTATION AND MATHEMATICS, 2012, 15 : 326 - 340
  • [44] Cryptanalysis of MICKEY family of stream ciphers
    Ding, Lin
    Guan, Jie
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (08) : 936 - 941
  • [45] State Convergence in the Initialisation of Stream Ciphers
    Teo, Sui-Guan
    Al-Hamdan, Ali
    Bartlett, Harry
    Simpson, Leonie
    Wong, Kenneth Koon-Ho
    Dawson, Ed
    INFORMATION SECURITY AND PRIVACY, 2011, 6812 : 75 - 88
  • [46] FASTER ATTACK ON CERTAIN STREAM CIPHERS
    ANDERSON, RJ
    ELECTRONICS LETTERS, 1993, 29 (15) : 1322 - 1323
  • [47] Stream ciphers based on the elliptic curves
    Nithin, V. S.
    Deepthi, P. P.
    Dbanaraj, K. J.
    Sathidevi, R. S.
    ICCIMA 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND MULTIMEDIA APPLICATIONS, VOL IV, PROCEEDINGS, 2007, : 99 - 104
  • [48] A review of some recent stream ciphers
    Kocheta, M.
    Sujatha, N.
    Sivakanya, K.
    Srikanth, R.
    Shetty, Sridhar
    Mohan, P. V. Ananda
    2013 INTERNATIONAL CONFERENCE ON CIRCUITS, CONTROLS AND COMMUNICATIONS (CCUBE), 2013,
  • [49] Recent advances in lightweight stream ciphers
    Akshay Bhasin
    Girish Mishra
    CSI Transactions on ICT, 2016, 4 (2-4) : 173 - 176
  • [50] New correlation attacks on stream ciphers
    Penzhorn, WT
    Bruwer, C
    2002 IEEE AFRICON, VOLS 1 AND 2: ELECTROTECHNOLOGICAL SERVICES FOR AFRICA, 2002, : 203 - 208