Security Analysis of A Stream Cipher with Proven Properties

被引:1
|
作者
Juntao, Gao [1 ]
Xuelian, Li [2 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Xidian Univ, Sch Math & Stat, Xian 710071, Peoples R China
关键词
Stream cipher; Security analysis; Spectra attack; Guess‐ and‐ determine attack;
D O I
10.1049/cje.2021.01.002
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Si and Ding proposed a stream cipher with two keys (the first and the second key) and an expected security strength. To further measure the security, we analyze the stream cipher by considering the selective discrete Fourier spectra attack and the fast selective discrete Fourier spectra attack. The two attacks reveal a fact that the second key is more important than the first key, that is, if the second key is leaked out, the first key can be obtained with a lower time complexity than that of the expected security. In addition, we analyze the ability of the stream cipher to resist the guess-and-determine attack. The results show an attacker is able to gain the two keys with an exponentially improved time complexity and a polynomial data complexity. It implies that we need a securer permutation over finite fields to design a new binary additive stream cipher to achieve the expected security level.
引用
收藏
页码:210 / 218
页数:9
相关论文
共 50 条
  • [21] A stream cipher engine for ad-hoc security
    Fukase, Masa-Aki
    Sato, Tomoaki
    [J]. CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 902 - +
  • [22] Physical Layer Security Using Stream Cipher For LTE
    Pillai, Preetha
    Pote, Santoshi
    [J]. 2015 IEEE BOMBAY SECTION SYMPOSIUM (IBSS), 2015,
  • [23] Security analysis of a QAM modulated quantum noise stream cipher under a correlation attack
    Zhang, Mingrui
    LI, Yajie
    Song, Haokun
    Zhu, Kongni
    Zhao, Yongli
    Zhang, Jie
    [J]. OPTICS EXPRESS, 2022, 30 (22) : 40645 - 40656
  • [24] Security Analysis of Image Cryptosystem Using Stream Cipher Algorithm with Nonlinear Filtering Function
    Aissa, Belmeguenai
    Nadir, Derouiche
    Khaled, Mansouri
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (09) : 150 - 156
  • [25] Fault Analysis on Stream Cipher MUGI
    Takahashi, Junko
    Fukunaga, Toshinori
    Sakiyama, Kazuo
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2010, 2011, 6829 : 420 - +
  • [26] The security of quantum noise stream cipher against collective attacks
    Wang, Kai
    Zhang, Jie
    [J]. QUANTUM INFORMATION PROCESSING, 2021, 20 (07)
  • [27] Stream Cipher-Based Hash Function and Its Security
    Nakano, Yuto
    Kurihara, Jun
    Kiyomoto, Shinsaku
    Tanaka, Toshiaki
    [J]. E-BUSINESS AND TELECOMMUNICATIONS, 2012, 222 : 188 - 202
  • [28] Some security results of the RC4+stream cipher
    Banik, Subhadeep
    Jha, Sonu
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4061 - 4072
  • [29] The security of quantum noise stream cipher against collective attacks
    Kai Wang
    Jie Zhang
    [J]. Quantum Information Processing, 2021, 20
  • [30] Strumok Stream Cipher: Spesification and Basic Properties
    Kuznetsov, Olexandr
    Lutsenko, Mariya
    Ivanenko, Dmytro
    [J]. 2016 THIRD INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2016, : 59 - 62