On the security of IV dependent stream ciphers

被引:0
作者
Berbain, Come [1 ]
Gilbert, Henri [1 ]
机构
[1] France Telecom R&D, 38-40 Rue Gen Leclerc, F-92794 Issy Les Moulineaux 9, France
来源
FAST SOFTWARE ENCRYPTION | 2007年 / 4593卷
关键词
stream cipher; PRNG; IV setup; provable security;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Almost all the existing stream ciphers are using two inputs: a secret key and an initial value (IV). However recent attacks indicate that designing a secure IV-dependent stream cipher and especially the key and IV setup component of such a cipher remains a difficult task. In this paper we first formally establish the security of a well known generic construction for deriving an IV-dependent stream cipher, namely the composition of a key and IV setup pseudo-random function (PRF) with a keystream generation pseudo-random number generator (PRNG). We then present a tree-based construction allowing to derive a IV-dependent stream cipher from a PRNG for a moderate cost that can be viewed as a subcase of the former generic construction. Finally we show that the recently proposed stream cipher QUAD [3] uses this tree-based construction and that consequently the security proof for QUAD's keystream generation part given in [3] can be extended to incorporate the key and IV setup.
引用
收藏
页码:254 / +
页数:4
相关论文
共 19 条
[1]  
[Anonymous], 2001, FDN CRYPTOGRAPHY
[2]  
[Anonymous], LECT NOTES COMPUTER
[3]  
Armknecht F, 2005, LECT NOTES COMPUT SC, V3357, P19
[4]  
BERBAIN C, 2006, LNCS, V4004
[5]  
Berbain C., 2005, SOSEMANUK FAST SOFTW
[6]  
BERNSTEIN DJ, 2006, RELATED KEY ATTACKS
[7]  
Biryukov A., 2005, NEW 128 BIT KEY STRE
[8]   HOW TO GENERATE CRYPTOGRAPHICALLY STRONG SEQUENCES OF PSEUDO-RANDOM BITS [J].
BLUM, M ;
MICALI, S .
SIAM JOURNAL ON COMPUTING, 1984, 13 (04) :850-864
[9]  
DAEMEN J, 1994, LECT NOTES COMPUTER, V765, P159
[10]   Another attack on A5/1 [J].
Ekdahl, P ;
Johansson, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (01) :284-289