Distinguishing attacks on stream ciphers based on arrays of pseudo-random words

被引:0
|
作者
Keller, Nathan [2 ]
Miller, Stephen D. [1 ]
机构
[1] Rutgers State Univ, Dept Math, Piscataway, NJ 08854 USA
[2] Hebrew Univ Jerusalem, Dept Math, IL-91904 Jerusalem, Israel
基金
美国国家科学基金会;
关键词
Cryptography; Stream ciphers; Distinguishing attacks; MV3; SN3;
D O I
10.1016/j.ipl.2009.11.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
in numerous modern stream ciphers, the internal state consists of a large array of pseudo-random words, while the Output key-stream is a relatively simple function of the state. It has been heuristically shown in several situations [3,8-11,14] that this structure may lead to distinguishing attacks on the cipher. In this note we present a more rigorous treatment of this structural attack. First, we present a rigorous proof of the main probabilistic claim behind it in the basic cases. We then apply it concretely to the cipher SN3 [12], and demonstrate that the heuristic assumptions of the attack are remarkably precise in more complicated cases. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:129 / 132
页数:4
相关论文
共 50 条
  • [1] Using hadamard transform for cryptanalysis of pseudo-random generators in stream ciphers
    Sosa-Gómez, Guillermo
    Rojas, Omar
    Páez-Osuna, Octavio
    EAI Endorsed Transactions on Energy Web, 2020, 7 (27)
  • [2] An overview of distinguishing attacks on stream ciphers
    Hell, Martin
    Johansson, Thomas
    Brynielsson, Lennart
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2009, 1 (01): : 71 - 94
  • [3] An overview of distinguishing attacks on stream ciphers
    Martin Hell
    Thomas Johansson
    Lennart Brynielsson
    Cryptography and Communications, 2009, 1 : 71 - 94
  • [4] Neural-Network-Based Pseudo-Random Number Generator Evaluation Tool for Stream Ciphers
    Kimura, Hayato
    Isobe, Takanori
    Ohigashi, Toshihiro
    2019 SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS (CANDARW 2019), 2019, : 333 - 338
  • [5] PSEUDO-RANDOM ARRAYS
    VANLINT, JH
    MACWILLIAMS, FJ
    SLOANE, NJA
    SIAM JOURNAL ON APPLIED MATHEMATICS, 1979, 36 (01) : 62 - 72
  • [6] PSEUDO-RANDOM SEQUENCES AND ARRAYS
    MACWILLIAMS, FJ
    SLOANE, NJA
    PROCEEDINGS OF THE IEEE, 1976, 64 (12) : 1715 - 1730
  • [7] Some Words on Linearisation Attacks on FCSR-based Stream Ciphers
    Ali, Arshad
    PROCEEDINGS OF 2014 11TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES & TECHNOLOGY (IBCAST), 2014, : 195 - 202
  • [8] Random Fault Attacks on a Class of Stream Ciphers
    Bartlett, Harry
    Dawson, Ed
    Al Mahri, Hassan Qahur
    Salam, Md. Iftekhar
    Simpson, Leonie
    Wong, Kenneth Koon-Ho
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [9] On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers
    Goutam Paul
    Souvik Ray
    Designs, Codes and Cryptography, 2018, 86 : 1211 - 1247
  • [10] On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers
    Paul, Goutam
    Ray, Souvik
    DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (06) : 1211 - 1247