Security Analysis of A Stream Cipher with Proven Properties

被引:1
作者
Juntao, Gao [1 ]
Xuelian, Li [2 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Xidian Univ, Sch Math & Stat, Xian 710071, Peoples R China
关键词
Stream cipher; Security analysis; Spectra attack; Guess‐ and‐ determine attack;
D O I
10.1049/cje.2021.01.002
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Si and Ding proposed a stream cipher with two keys (the first and the second key) and an expected security strength. To further measure the security, we analyze the stream cipher by considering the selective discrete Fourier spectra attack and the fast selective discrete Fourier spectra attack. The two attacks reveal a fact that the second key is more important than the first key, that is, if the second key is leaked out, the first key can be obtained with a lower time complexity than that of the expected security. In addition, we analyze the ability of the stream cipher to resist the guess-and-determine attack. The results show an attacker is able to gain the two keys with an exponentially improved time complexity and a polynomial data complexity. It implies that we need a securer permutation over finite fields to design a new binary additive stream cipher to achieve the expected security level.
引用
收藏
页码:210 / 218
页数:9
相关论文
共 50 条
  • [11] The practical security and performance analysis of the quantum data stream cipher system by the αη protocol
    Lu Yuan
    Huang Peng
    Zhu Jun
    Dai Wen-Chao
    Zeng Gui-Hua
    ACTA PHYSICA SINICA, 2012, 61 (08)
  • [12] On the Security of Designing a Cellular Automata Based Stream Cipher
    Maiti, Swapan
    Ghosh, Shamit
    Chowdhury, Dipanwita Roy
    INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 : 406 - 413
  • [13] Tight Security Bounds for Generic Stream Cipher Constructions
    Hamann, Matthias
    Krause, Matthias
    Moch, Alexander
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2019, 2020, 11959 : 335 - 364
  • [14] Application of Stream Cipher and Hash Function in Network Security
    Jain, Aaditya
    Mangal, Neha
    PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 429 - 435
  • [15] Physical Layer Security Using Stream Cipher For LTE
    Pillai, Preetha
    Pote, Santoshi
    2015 IEEE BOMBAY SECTION SYMPOSIUM (IBSS), 2015,
  • [16] A chaotic cipher Mmohocc and its security analysis
    Zhang, Xiaowen
    Shu, Li
    Tang, Ke
    MOBILE MULTIMEDIA/IMAGE PROCESSING FOR MILITARY AND SECURITY APPLICATIONS 2007, 2007, 6579
  • [17] Security Analysis of Image Cryptosystem Using Stream Cipher Algorithm with Nonlinear Filtering Function
    Aissa, Belmeguenai
    Nadir, Derouiche
    Khaled, Mansouri
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (09) : 150 - 156
  • [18] Fault Analysis on Stream Cipher MUGI
    Takahashi, Junko
    Fukunaga, Toshinori
    Sakiyama, Kazuo
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2010, 2011, 6829 : 420 - +
  • [19] Stream Cipher-Based Hash Function and Its Security
    Nakano, Yuto
    Kurihara, Jun
    Kiyomoto, Shinsaku
    Tanaka, Toshiaki
    E-BUSINESS AND TELECOMMUNICATIONS, 2012, 222 : 188 - 202
  • [20] Strumok Stream Cipher: Spesification and Basic Properties
    Kuznetsov, Olexandr
    Lutsenko, Mariya
    Ivanenko, Dmytro
    2016 THIRD INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2016, : 59 - 62