Security analysis of a new stream cipher

被引:1
|
作者
Zhang Bin [1 ]
Feng Dengguo [1 ]
机构
[1] Chinese Acad Sci, State Key Lab Informat Secur, Inst Software, Beijing 100080, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
stream cipher; divide-and-conquer attack; non-linear feedback shift registers (NLFSR); chaotic sequence;
D O I
10.1007/s11432-006-0286-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we analyze the security of a new stream cipher-COSvd(2,128). This cipher was proposed by E. Filiol et al. at the ECRYPT SASC'2004 (The State of the Art of Stream Ciphers). It uses clock-controlled non-linear feedback registers together with an S-box controlled by a chaotic sequence and was claimed to prevent any existing attacks. However, our analysis shows that there are some serious security flaws in the design of the S-box, resulting in heavy biased byte distribution in the keystream. In some broadcast applications, this flaw will cause a ciphertext-only attack with high success rate. Besides, there are also many security flaws in other parts of the cipher. We point out these flaws one by one and develop a divide-and-conquer attack to recover the secret keys from O(2(26))-byte known plaintext with success rate 93.4597% and complexity O(2(113)), which is much lower than 2(512), the complexity of exhaustive search.
引用
收藏
页码:286 / 301
页数:16
相关论文
共 50 条
  • [1] Security analysis of a new stream cipher
    ZHANG Bin & FENG Dengguo State Key Laboratory of Information Security
    [J]. Science China(Information Sciences), 2006, (03) : 286 - 301
  • [2] Security analysis of a new stream cipher
    Bin Zhang
    Dengguo Feng
    [J]. Science in China Series F, 2006, 49 : 286 - 301
  • [3] Security Analysis of a New FPE Stream Cipher
    Perez-Resa, A.
    Garcia-Bosque, M.
    Sanchez-Azqueta, C.
    Celma, S.
    [J]. 2020 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2020,
  • [4] THE SECURITY ANALYSIS ON THE RABBIT STREAM CIPHER
    Chain, Kai
    [J]. INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2024, 16 (02): : 91 - 102
  • [5] Security Analysis of A Stream Cipher with Proven Properties
    GAO Juntao
    LI Xuelian
    [J]. Chinese Journal of Electronics, 2021, 30 (02) : 210 - 218
  • [6] Security performance analysis of a chaotic stream cipher
    Zhuosheng Lin
    Guangyi Wang
    Xiaoyuan Wang
    Simin Yu
    Jinhu Lü
    [J]. Nonlinear Dynamics, 2018, 94 : 1003 - 1017
  • [7] Security performance analysis of a chaotic stream cipher
    Lin, Zhuosheng
    Wang, Guangyi
    Wang, Xiaoyuan
    Yu, Simin
    Lu, Jinhu
    [J]. NONLINEAR DYNAMICS, 2018, 94 (02) : 1003 - 1017
  • [8] Security Analysis of A Stream Cipher with Proven Properties
    Juntao, Gao
    Xuelian, Li
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2021, 30 (02) : 210 - 218
  • [9] Improving security of Vector Stream Cipher
    Iwasaki, Atsushi
    Umeno, Ken
    [J]. IEICE NONLINEAR THEORY AND ITS APPLICATIONS, 2016, 7 (01): : 30 - 37
  • [10] Practical security analysis of a quantum stream cipher by the Yuen 2000 protocol
    Hirota, Osamu
    [J]. PHYSICAL REVIEW A, 2007, 76 (03):