QUAD: A multivariate stream cipher with provable security

被引:10
|
作者
Berbain, Come [1 ]
Gilbert, Henri [1 ]
Patarin, Jacques [1 ]
机构
[1] Univ Versailles, Versailles, France
关键词
MQ problem; Stream cipher; Provable security; Grobner basis computation;
D O I
10.1016/j.jsc.2008.10.004
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we present the stream cipher QUAD and the provable security arguments supporting its conjectured strength for suitable parameter values. QUAD was first proposed at Eurocrypt 2006 by Berbain and co-workers [Berbain, C., Gilbert, H., Patarin, J.. 2006b. QUAD: A practical stream cipher with provable security. In: Vaudenay, S. (Ed.), Advances in Cryptology - EUROCRYPT 2006. In: Lecture Notes in Computer Science, Springer-Verlag]. It relies on the iteration of a set of multivariate quadratic polynomials over a finite field, typically GF(2) or a small extension. We show that in the binary case, the security of the keystream generation can be related, in the concrete security model, to the conjectured intractability of the MQ problem of solving a random system of m equations in n unknowns. We show furthermore that this security reduction can be extended to incorporate the key and IV setup and provide a security argument related to the whole stream cipher. We also briefly address software and hardware performance issues and show that if one is willing to pseudo-randomly generate the sets of quadratic polynomials underlying the cipher, this leads to surprisingly inexpensive hardware implementations of QUAD. (c) 2009 Published by Elsevier Ltd
引用
收藏
页码:1703 / 1723
页数:21
相关论文
共 50 条
  • [1] QUAD: A practical stream cipher with provable security
    Berbain, Come
    Gilbert, Henri
    Patarin, Jacques
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2006, PROCEEDINGS, 2006, 4004 : 109 - 128
  • [2] The DRACO Stream Cipher A Power-efficient Small-state Stream Cipher with Full Provable Security against TMDTO Attacks
    Hamann, Matthias
    Moch, Alexander
    Krause, Matthias
    Mikhalev, Vasily
    [J]. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2022, 2022 (02) : 1 - 42
  • [3] Efficient Implementation for QUAD Stream Cipher with GPUs
    Tanaka, Satoshi
    Nishide, Takashi
    Sakurai, Kouichi
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2013, 10 (02) : 897 - 911
  • [4] 10 Gbps quantum stream cipher by Y-00 for super HDTV transmission with provable security
    Hirota, Osamu
    Shimizua, Tetsuya
    Katayama, Takehiko
    Harasawa, Katsuyoshi
    [J]. QUANTUM COMMUNICATIONS AND QUANTUM IMAGING V, 2007, 6710
  • [5] Security analysis of a new stream cipher
    Zhang Bin
    Feng Dengguo
    [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2006, 49 (03): : 286 - 301
  • [6] Security analysis of a new stream cipher
    ZHANG Bin & FENG Dengguo State Key Laboratory of Information Security
    [J]. Science China(Information Sciences), 2006, (03) : 286 - 301
  • [7] Improving security of Vector Stream Cipher
    Iwasaki, Atsushi
    Umeno, Ken
    [J]. IEICE NONLINEAR THEORY AND ITS APPLICATIONS, 2016, 7 (01): : 30 - 37
  • [8] THE SECURITY ANALYSIS ON THE RABBIT STREAM CIPHER
    Chain, Kai
    [J]. INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2024, 16 (02): : 91 - 102
  • [9] Security analysis of a new stream cipher
    Bin Zhang
    Dengguo Feng
    [J]. Science in China Series F, 2006, 49 : 286 - 301
  • [10] Improved Asymmetric Cipher Based on Matrix Power Function with Provable Security
    Sakalauskas, Eligijus
    Mihalkovich, Aleksejus
    Venckauskas, Algimantas
    [J]. SYMMETRY-BASEL, 2017, 9 (01):