Security analysis of a new stream cipher

被引:0
|
作者
Bin Zhang
Dengguo Feng
机构
[1] Chinese Academy of Sciences,State Key Laboratory of Information Security, Institute of Software
来源
Science in China Series F | 2006年 / 49卷
关键词
stream cipher; divide-and-conquer attack; non-linear feedback shift registers (NLFSR); chaotic sequence;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we analyze the security of a new stream cipher-COSvd(2, 128). This cipher was proposed by E. Filiol et al. at the ECRYPT SASC’2004 (The State of the Art of Stream Ciphers). It uses clock-controlled non-linear feedback registers together with an S-box controlled by a chaotic sequence and was claimed to prevent any existing attacks. However, our analysis shows that there are some serious security flaws in the design of the S-box, resulting in heavy biased byte distribution in the keystream. In some broadcast applications, this flaw will cause a ciphertext-only attack with high success rate. Besides, there are also many security flaws in other parts of the cipher. We point out these flaws one by one and develop a divide-and-conquer attack to recover the secret keys from O(226)-byte known plaintext with success rate 93.4597% and complexity O(2113), which is much lower than 2512, the complexity of exhaustive search.
引用
收藏
页码:286 / 301
页数:15
相关论文
共 50 条
  • [21] Physical Layer Security Using Stream Cipher For LTE
    Pillai, Preetha
    Pote, Santoshi
    [J]. 2015 IEEE BOMBAY SECTION SYMPOSIUM (IBSS), 2015,
  • [22] Cryptanalysis of a new stream cipher structure
    Huang, Xiao-Li
    Wu, Chuan-Kun
    [J]. Ruan Jian Xue Bao/Journal of Software, 2008, 19 (05): : 1256 - 1264
  • [23] A New Attack on the LEX Stream Cipher
    Dunkelman, Orr
    Keller, Nathan
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008, 2008, 5350 : 539 - +
  • [24] Chameleon - A new kind of stream cipher
    Anderson, R
    Manifavas, C
    [J]. FAST SOFTWARE ENCRYPTION, 1997, 1267 : 107 - 113
  • [25] New Implementations of the WG Stream Cipher
    El-Razouk, Hayssam
    Reyhani-Masoleh, Arash
    Gong, Guang
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2014, 22 (09) : 1865 - 1878
  • [26] Security analysis of a QAM modulated quantum noise stream cipher under a correlation attack
    Zhang, Mingrui
    LI, Yajie
    Song, Haokun
    Zhu, Kongni
    Zhao, Yongli
    Zhang, Jie
    [J]. OPTICS EXPRESS, 2022, 30 (22) : 40645 - 40656
  • [27] A new version of the stream cipher SNOW
    Ekdahl, P
    Johansson, T
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2003, 2595 : 47 - 61
  • [28] COZMO - A New Lightweight Stream Cipher
    Bonnerji, Rhea
    Sarkar, Simanta
    Rarhi, Krishnendu
    Bhattacharya, Abhishek
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT 2018), 2018, : 565 - 568
  • [29] The research of the new stream cipher encryption
    Zhuang, Peidong
    Wang, Zhigang
    Ding, Qun
    [J]. Yi Qi Yi Biao Xue Bao/Chinese Journal of Scientific Instrument, 2009, 30 (SUPPL.): : 323 - 331
  • [30] Security Analysis of Image Cryptosystem Using Stream Cipher Algorithm with Nonlinear Filtering Function
    Aissa, Belmeguenai
    Nadir, Derouiche
    Khaled, Mansouri
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (09) : 150 - 156