QUAD: A multivariate stream cipher with provable security

被引:10
|
作者
Berbain, Come [1 ]
Gilbert, Henri [1 ]
Patarin, Jacques [1 ]
机构
[1] Univ Versailles, Versailles, France
关键词
MQ problem; Stream cipher; Provable security; Grobner basis computation;
D O I
10.1016/j.jsc.2008.10.004
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we present the stream cipher QUAD and the provable security arguments supporting its conjectured strength for suitable parameter values. QUAD was first proposed at Eurocrypt 2006 by Berbain and co-workers [Berbain, C., Gilbert, H., Patarin, J.. 2006b. QUAD: A practical stream cipher with provable security. In: Vaudenay, S. (Ed.), Advances in Cryptology - EUROCRYPT 2006. In: Lecture Notes in Computer Science, Springer-Verlag]. It relies on the iteration of a set of multivariate quadratic polynomials over a finite field, typically GF(2) or a small extension. We show that in the binary case, the security of the keystream generation can be related, in the concrete security model, to the conjectured intractability of the MQ problem of solving a random system of m equations in n unknowns. We show furthermore that this security reduction can be extended to incorporate the key and IV setup and provide a security argument related to the whole stream cipher. We also briefly address software and hardware performance issues and show that if one is willing to pseudo-randomly generate the sets of quadratic polynomials underlying the cipher, this leads to surprisingly inexpensive hardware implementations of QUAD. (c) 2009 Published by Elsevier Ltd
引用
收藏
页码:1703 / 1723
页数:21
相关论文
共 50 条
  • [41] The practical security and performance analysis of the quantum data stream cipher system by the αη protocol
    Lu Yuan
    Huang Peng
    Zhu Jun
    Dai Wen-Chao
    Zeng Gui-Hua
    [J]. ACTA PHYSICA SINICA, 2012, 61 (08)
  • [42] On the security of a stream cipher in reversible data hiding schemes operating in the encrypted domain
    Khelifi, Fouad
    [J]. SIGNAL PROCESSING, 2018, 143 : 336 - 345
  • [43] Security Analysis of Quantum Noise Stream Cipher under Fast Correlation Attack
    Zhang, Mingrui
    Li, Yajie
    Song, Haokun
    Wang, Bo
    Mao, Yongli
    Mang, Jie
    [J]. 2021 OPTICAL FIBER COMMUNICATIONS CONFERENCE AND EXPOSITION (OFC), 2021,
  • [44] Implementation of salsa20 stream cipher algorithm as an alternative cipher suite SSL-VPN for VOIP security
    Nugrahtama, Aghnia Luthfy
    Pramadi, Yogha Restu
    [J]. TARUMANAGARA INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF TECHNOLOGY AND ENGINEERING, 2019, 508
  • [45] Internet of Things Big Data Security in Cloud via Stream Cipher and Clustering Model
    K. S. Saraswathy
    S. S. Sujatha
    [J]. Wireless Personal Communications, 2022, 123 : 3483 - 3496
  • [46] Security analysis of a QAM modulated quantum noise stream cipher under a correlation attack
    Zhang, Mingrui
    LI, Yajie
    Song, Haokun
    Zhu, Kongni
    Zhao, Yongli
    Zhang, Jie
    [J]. OPTICS EXPRESS, 2022, 30 (22) : 40645 - 40656
  • [47] Quantum enigma cipher as a generalization of the quantum stream cipher
    Kato, Kentaro
    [J]. QUANTUM COMMUNICATIONS AND QUANTUM IMAGING XIV, 2016, 9980
  • [48] Hybrid-Key Stream Cipher Mechanism for Hadoop Distributed File System Security
    Khafagy, Omar Helmy
    Ibrahim, Mohamed Hasan
    Omara, Fatma A.
    [J]. PROCEEDINGS OF 2020 INTERNATIONAL CONFERENCE ON INNOVATIVE TRENDS IN COMMUNICATION AND COMPUTER ENGINEERING (ITCE), 2020, : 39 - 43
  • [49] Experimental Evaluation of Certain Security Issues of Grain v1 Stream Cipher
    Arsic, Aleksandra
    Jelisavcic, Vladisav
    Mihaljevic, Miodrag J.
    [J]. IPSI BGD TRANSACTIONS ON INTERNET RESEARCH, 2016, 12 (02):
  • [50] An Fpga implementation of the HME self-synchronizing stream cipher for enhanced security and performance
    Tanougast, C.
    Weber, S.
    Millerioux, G.
    Bouridane, A.
    Daafouz, J.
    [J]. NASA/ESA CONFERENCE ON ADAPTIVE HARDWARE AND SYSTEMS, PROCEEDINGS, 2007, : 110 - +