On Analysis of Lightweight Stream Ciphers with Keyed Update

被引:6
|
作者
Kara, Orhun [1 ]
Esgin, Muhammed F. [2 ,3 ]
机构
[1] TUBITAK BILGEM UEKAE Natl Res Inst Cryptol & Elec, TR-41470 Gebze, Kocaeli, Turkey
[2] Monash Univ, Fac Informat Technol, Clayton, Vic 3800, Australia
[3] CSIRO, Data61, Canberra, ACT 2601, Australia
关键词
Lightweight cipher; keystream generator; stream cipher; time-memory-data tradeoff; keyed update function; symmetric encryption; sprout; FAMILY;
D O I
10.1109/TC.2018.2851239
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As the need for lightweight cryptography has grown even more due to the evolution of the Internet of Things, it has become a greater challenge for cryptographers to design ultra lightweight stream ciphers in compliance with the rule of thumb that the internal state size should be at least twice as the key size to defend against generic Time-Memory-Data Tradeoff (TMDT) attacks. However, Recently in 2015, Armknecht and Mikhalev sparked a new light on designing keystream generators (KSGs), which in turn yields stream ciphers, with small internal states, called KSG with Keyed Update Function (KSG with KUF), and gave a concrete construction named Sprout. But, currently, security analysis of KSGs with KUF in a general setting is almost non-existent. Our contribution in this paper is two-fold. 1) We give a general mathematical setting for KSGs with KUF, and for the first time, analyze a class of such KSGs, called KSGs with Boolean Keyed Feedback Function (KSG with Boolean KFF), generically. In particular, we develop two generic attack algorithms applicable to any KSG with Boolean KFF having almost arbitrary output and feedback functions where the only requirement is that the secret key incorporation is biased. We introduce an upper bound for the time complexity of the first algorithm. Our extensive experiments validate our algorithms and assumptions made thereof. 2) We study Sprout to show the effectiveness of our algorithms in a practical instance. A straightforward application of our generic algorithm yields one of the most successful attacks on Sprout.
引用
收藏
页码:99 / 110
页数:12
相关论文
共 50 条
  • [1] Recent advances in lightweight stream ciphers
    Akshay Bhasin
    Girish Mishra
    [J]. CSI Transactions on ICT, 2016, 4 (2-4) : 173 - 176
  • [2] Performance analysis of current lightweight stream ciphers for constrained environments
    Deb, Subhrajyoti
    Bhuyan, Bubu
    [J]. SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2020, 45 (01):
  • [3] Performance analysis of current lightweight stream ciphers for constrained environments
    Subhrajyoti Deb
    Bubu Bhuyan
    [J]. Sādhanā, 2020, 45
  • [4] On Lightweight Stream Ciphers with Shorter Internal States
    Armknecht, Frederik
    Mikhalev, Vasily
    [J]. FAST SOFTWARE ENCRYPTION, FSE 2015, 2015, 9054 : 451 - 470
  • [5] A survey of lightweight stream ciphers for embedded systems
    Manifavas, Charalampos
    Hatzivasilis, George
    Fysarakis, Konstantinos
    Papaefstathiou, Yannis
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (10) : 1226 - 1246
  • [6] Fault analysis of stream ciphers
    Hoch, JJ
    Shamir, A
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 240 - 253
  • [7] Stream Ciphers Analysis Methods
    Bucerzan, D.
    Craciun, M.
    Chis, V.
    Ratiu, C.
    [J]. INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2010, 5 (04) : 483 - 489
  • [8] Enhancing CAN Security by Means of Lightweight Stream-Ciphers and Protocols
    Boudguiga, Aymen
    Letailleur, Jerome
    Sirdey, Renaud
    Klaudel, Witold
    [J]. COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2019, 2019, 11699 : 235 - 250
  • [9] Differential power analysis of stream ciphers
    Fischer, W.
    Gammel, B. M.
    Kniffler, O.
    Velten, J.
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2007, PROCEEDINGS, 2007, 4377 : 257 - 270
  • [10] Fault analysis of the PRINCE family of lightweight ciphers
    Kundu, Anup Kumar
    Aikata
    Karmakar, Banashri
    Saha, Dhiman
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2022, 12 (04) : 475 - 494