On the security of IV dependent stream ciphers

被引:0
作者
Berbain, Come [1 ]
Gilbert, Henri [1 ]
机构
[1] France Telecom R&D, 38-40 Rue Gen Leclerc, F-92794 Issy Les Moulineaux 9, France
来源
FAST SOFTWARE ENCRYPTION | 2007年 / 4593卷
关键词
stream cipher; PRNG; IV setup; provable security;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Almost all the existing stream ciphers are using two inputs: a secret key and an initial value (IV). However recent attacks indicate that designing a secure IV-dependent stream cipher and especially the key and IV setup component of such a cipher remains a difficult task. In this paper we first formally establish the security of a well known generic construction for deriving an IV-dependent stream cipher, namely the composition of a key and IV setup pseudo-random function (PRF) with a keystream generation pseudo-random number generator (PRNG). We then present a tree-based construction allowing to derive a IV-dependent stream cipher from a PRNG for a moderate cost that can be viewed as a subcase of the former generic construction. Finally we show that the recently proposed stream cipher QUAD [3] uses this tree-based construction and that consequently the security proof for QUAD's keystream generation part given in [3] can be extended to incorporate the key and IV setup.
引用
收藏
页码:254 / +
页数:4
相关论文
共 19 条
  • [1] [Anonymous], 2001, FDN CRYPTOGRAPHY
  • [2] [Anonymous], LECT NOTES COMPUTER
  • [3] Armknecht F, 2005, LECT NOTES COMPUT SC, V3357, P19
  • [4] BERBAIN C, 2006, LNCS, V4004
  • [5] Berbain C., 2005, SOSEMANUK FAST SOFTW
  • [6] BERNSTEIN DJ, 2006, RELATED KEY ATTACKS
  • [7] Biryukov A., 2005, NEW 128 BIT KEY STRE
  • [8] HOW TO GENERATE CRYPTOGRAPHICALLY STRONG SEQUENCES OF PSEUDO-RANDOM BITS
    BLUM, M
    MICALI, S
    [J]. SIAM JOURNAL ON COMPUTING, 1984, 13 (04) : 850 - 864
  • [9] DAEMEN J, 1994, LECT NOTES COMPUTER, V765, P159
  • [10] Another attack on A5/1
    Ekdahl, P
    Johansson, T
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (01) : 284 - 289