Security Analysis of A Stream Cipher with Proven Properties

被引:1
作者
Juntao, Gao [1 ]
Xuelian, Li [2 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Xidian Univ, Sch Math & Stat, Xian 710071, Peoples R China
关键词
Stream cipher; Security analysis; Spectra attack; Guess‐ and‐ determine attack;
D O I
10.1049/cje.2021.01.002
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Si and Ding proposed a stream cipher with two keys (the first and the second key) and an expected security strength. To further measure the security, we analyze the stream cipher by considering the selective discrete Fourier spectra attack and the fast selective discrete Fourier spectra attack. The two attacks reveal a fact that the second key is more important than the first key, that is, if the second key is leaked out, the first key can be obtained with a lower time complexity than that of the expected security. In addition, we analyze the ability of the stream cipher to resist the guess-and-determine attack. The results show an attacker is able to gain the two keys with an exponentially improved time complexity and a polynomial data complexity. It implies that we need a securer permutation over finite fields to design a new binary additive stream cipher to achieve the expected security level.
引用
收藏
页码:210 / 218
页数:9
相关论文
共 50 条
  • [1] A simple stream cipher with proven properties
    Si, Wenpei
    Ding, Cunsheng
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2012, 4 (02): : 79 - 104
  • [2] A simple stream cipher with proven properties
    Wenpei Si
    Cunsheng Ding
    Cryptography and Communications, 2012, 4 : 79 - 104
  • [3] Security analysis of a new stream cipher
    Zhang Bin
    Feng Dengguo
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2006, 49 (03): : 286 - 301
  • [4] Security analysis of a new stream cipher
    Bin Zhang
    Dengguo Feng
    Science in China Series F, 2006, 49 : 286 - 301
  • [5] Security analysis of a new stream cipher
    ZHANG Bin & FENG Dengguo State Key Laboratory of Information Security
    ScienceinChina(SeriesF:InformationSciences), 2006, (03) : 286 - 301
  • [6] THE SECURITY ANALYSIS ON THE RABBIT STREAM CIPHER
    Chain, Kai
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2024, 16 (02): : 91 - 102
  • [7] Security Analysis of a New FPE Stream Cipher
    Perez-Resa, A.
    Garcia-Bosque, M.
    Sanchez-Azqueta, C.
    Celma, S.
    2020 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2020,
  • [8] A commercial application of a chaos-based-stream cipher: Performance and Security analysis
    Vidal, Gerard
    Becheikh, Rabei
    Rhouma, Rhouma
    Belghith, Safya
    2016 11TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2016, : 39 - 44
  • [9] Improving security of Vector Stream Cipher
    Iwasaki, Atsushi
    Umeno, Ken
    IEICE NONLINEAR THEORY AND ITS APPLICATIONS, 2016, 7 (01): : 30 - 37
  • [10] QUAD: A multivariate stream cipher with provable security
    Berbain, Come
    Gilbert, Henri
    Patarin, Jacques
    JOURNAL OF SYMBOLIC COMPUTATION, 2009, 44 (12) : 1703 - 1723