Bias in the LEVIATHAN stream cipher

被引:0
|
作者
Crowley, P [1 ]
Lucks, S
机构
[1] Cryptolabs Amsterdam, Amsterdam, Netherlands
[2] Univ Mannheim, D-6800 Mannheim 1, Germany
来源
FAST SOFTWARE ENCRYPTION | 2002年 / 2355卷
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We show two methods of distinguishing the LEVIATHAN stream cipher from a random stream using 2(36) bytes of output and proportional effort; both arise from compression within the cipher. The first models the cipher as two random functions in sequence, and shows that the probability of a collision in 64-bit output blocks is doubled as a result; the second shows artifacts where the same inputs are presented to the key-dependent S-boxes in the final stage of the cipher for two successive outputs. Both distinguishers are demonstrated with experiments on a reduced variant of the cipher.
引用
收藏
页码:211 / 218
页数:8
相关论文
共 50 条
  • [21] Stream cipher designs: a review
    Jiao, Lin
    Hao, Yonglin
    Feng, Dengguo
    SCIENCE CHINA-INFORMATION SCIENCES, 2020, 63 (03)
  • [22] Turing: A fast stream cipher
    Rose, GG
    Hawkes, P
    FAST SOFTWARE ENCRYPTION, 2003, 2887 : 290 - 306
  • [23] Mixer - a new stream cipher
    Kanso, Ali A.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2008, 11 (02): : 159 - 179
  • [24] A stream cipher construction inspired by block cipher design principles
    De Canniere, Christophe
    INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 171 - 186
  • [25] BRRC: A Hybrid Approach Using Block Cipher and Stream Cipher
    Kumar, Binay
    Hussain, Muzzammil
    Kumar, Vijay
    PROGRESS IN ADVANCED COMPUTING AND INTELLIGENT ENGINEERING, PROCEEDINGS OF ICACIE 2016, VOLUME 1, 2018, 563 : 221 - 231
  • [26] Cryptanalysis of Stream Cipher: Method Implementation
    Al-Sabaawi, Aiman
    2021 IEEE ASIA-PACIFIC CONFERENCE ON COMPUTER SCIENCE AND DATA ENGINEERING (CSDE), 2021,
  • [27] A fast and light stream cipher for smartphones
    G. Vidal
    M.S. Baptista
    H. Mancini
    The European Physical Journal Special Topics, 2014, 223 : 1601 - 1610
  • [28] Distinguishing attack on the stream cipher Sosemanuk
    Li, Shunbo
    Hu, Yupu
    Wang, Yan
    Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University, 2012, 33 (02): : 259 - 262
  • [29] Cryptanalysis of the Full Spritz Stream Cipher
    Banik, Subhadeep
    Isobe, Takanori
    FAST SOFTWARE ENCRYPTION (FSE 2016), 2016, 9783 : 63 - 77
  • [30] Rotational Cryptanalysis on ChaCha Stream Cipher
    Barbero, Stefano
    Bazzanella, Danilo
    Bellini, Emanuele
    SYMMETRY-BASEL, 2022, 14 (06):