Bit Independence Criterion Extended to Stream Ciphers

被引:10
作者
Madarro-Capo, Evaristo Jose [1 ]
Legon-Perez, Carlos Miguel [1 ]
Rojas, Omar [2 ]
Sosa-Gomez, Guillermo [2 ]
Socorro-Llanes, Raisa [3 ]
机构
[1] Univ Havana, Inst Cryptog, Havana 10400, Cuba
[2] Univ Panamer, Fac Ciencias Econ & Empresariales, Alvaro del Portillo 49, Zapopan 45010, Jalisco, Mexico
[3] Technol Univ Havana UTH, Fac Informat, CUJAE, Havana 19390, Cuba
来源
APPLIED SCIENCES-BASEL | 2020年 / 10卷 / 21期
关键词
bit independence criterion; bit independence; RC4; stream cipher; complexity; RANDOMNESS; PERFORMANCE;
D O I
10.3390/app10217668
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The bit independence criterion was proposed to evaluate the security of the S-boxes used in block ciphers. This paper proposes an algorithm that extends this criterion to evaluate the degree of independence between the bits of inputs and outputs of the stream ciphers. The effectiveness of the algorithm is experimentally confirmed in two scenarios: random outputs independent of the input, in which it does not detect dependence, and in the RC4 ciphers, where it detects significant dependencies related to some known weaknesses. The complexity of the algorithm is estimated based on the number of inputs l, and the dimensions, n and m, of the inputs and outputs, respectively.
引用
收藏
页码:1 / 19
页数:19
相关论文
共 47 条
[1]  
[Anonymous], 2010, Technical report
[2]  
[Anonymous], 2019, ENTROPY SWITZ, DOI DOI 10.3390/E21080720
[3]   Measuring Independence between Statistical Randomness Tests by Mutual Information [J].
Augusto Karell-Albo, Jorge ;
Miguel Legon-Perez, Carlos ;
Jose Madarro-Capo, Evaristo ;
Rojas, Omar ;
Sosa-Gomez, Guillermo .
ENTROPY, 2020, 22 (07)
[4]   The strict avalanche criterion randomness test [J].
Castro, JCH ;
Sierra, JM ;
Seznec, A ;
Izquierdo, A ;
Ribagorda, A .
MATHEMATICS AND COMPUTERS IN SIMULATION, 2005, 68 (01) :1-7
[5]  
Chen JG, 2011, LECT NOTES COMPUT SC, V7001, P32, DOI 10.1007/978-3-642-24861-0_3
[6]  
Demirhan H., 2016, Istatistikciler Dergisi: Istatistik ve Aktuerya, V9, P1
[7]  
Dhiman A., 2019, COMMUN COMPUT INF SC, V839, P308, DOI [10.1007/978-981-13-2372-0_27, DOI 10.1007/978-981-13-2372-0_27]
[8]  
Duta B.C. A. C. L., 2014, International Journal on Cryptography and Information Security (IJCIS), V4, P31, DOI [10.5121/ijcis.2014.4103, DOI 10.5121/IJCIS.2014.4103]
[9]  
Gorbenko I., 2019, Int. J. Comput, V18, P82, DOI [10.47839/ijc.18.1.1277, DOI 10.47839/IJC.18.1.1277]
[10]  
Gorbenko I, 2017, 2017 4TH INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS-SCIENCE AND TECHNOLOGY (PIC S&T), P207, DOI 10.1109/INFOCOMMST.2017.8246381