Bias in the LEVIATHAN stream cipher

被引:0
|
作者
Crowley, P [1 ]
Lucks, S
机构
[1] Cryptolabs Amsterdam, Amsterdam, Netherlands
[2] Univ Mannheim, D-6800 Mannheim 1, Germany
来源
FAST SOFTWARE ENCRYPTION | 2002年 / 2355卷
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We show two methods of distinguishing the LEVIATHAN stream cipher from a random stream using 2(36) bytes of output and proportional effort; both arise from compression within the cipher. The first models the cipher as two random functions in sequence, and shows that the probability of a collision in 64-bit output blocks is doubled as a result; the second shows artifacts where the same inputs are presented to the key-dependent S-boxes in the final stage of the cipher for two successive outputs. Both distinguishers are demonstrated with experiments on a reduced variant of the cipher.
引用
收藏
页码:211 / 218
页数:8
相关论文
共 50 条
  • [1] High speed architectures for Leviathan: a binary tree based stream cipher
    Sonecha, D
    Yang, B
    Karri, R
    McGrew, DA
    MICROPROCESSORS AND MICROSYSTEMS, 2004, 28 (10) : 573 - 584
  • [2] The rabbit stream cipher
    Boesgaard, Martin
    Vesterager, Mette
    Zenner, Erik
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2008, 4986 LNCS : 69 - 83
  • [3] HENON STREAM CIPHER
    ERDMANN, D
    MURPHY, S
    ELECTRONICS LETTERS, 1992, 28 (09) : 893 - 895
  • [4] The RAKAPOSHI Stream Cipher
    Cid, Carlos
    Kiyomoto, Shinsaku
    Kurihara, Jun
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2009, 5927 : 32 - +
  • [5] Quantum enigma cipher as a generalization of the quantum stream cipher
    Kato, Kentaro
    QUANTUM COMMUNICATIONS AND QUANTUM IMAGING XIV, 2016, 9980
  • [6] The design of a stream cipher LEX
    Biryukov, Alex
    SELECTED AREAS IN CRYPTOGRAPHY, 2007, 4356 : 67 - 75
  • [7] Stream cipher design for MANets
    Delgado, Oscar
    Fuster, Amparo
    COMPUTATION IN MODERN SCIENCE AND ENGINEERING VOL 2, PTS A AND B, 2007, 2 : 965 - 968
  • [8] On parallelizing the CryptMT stream cipher
    Stefan, Deian
    Nummey, David B.
    Harwayne-Gidansky, Jared
    Dalal, Ishaan L.
    2008 IEEE 67TH VEHICULAR TECHNOLOGY CONFERENCE-SPRING, VOLS 1-7, 2008, : 1082 - 1086
  • [9] Cryptanalysis of chaotic stream cipher
    Skrobek, Adrian
    PHYSICS LETTERS A, 2007, 363 (1-2) : 84 - 90
  • [10] Cryptanalysis of the stream cipher DECIM
    Wu, Hongjun
    Preneel, Bart
    FAST SOFTWARE ENCRYPTION, 2006, 4047 : 30 - 40