Security Analysis of A Stream Cipher with Proven Properties

被引:1
作者
Juntao, Gao [1 ]
Xuelian, Li [2 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Xidian Univ, Sch Math & Stat, Xian 710071, Peoples R China
关键词
Stream cipher; Security analysis; Spectra attack; Guess‐ and‐ determine attack;
D O I
10.1049/cje.2021.01.002
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Si and Ding proposed a stream cipher with two keys (the first and the second key) and an expected security strength. To further measure the security, we analyze the stream cipher by considering the selective discrete Fourier spectra attack and the fast selective discrete Fourier spectra attack. The two attacks reveal a fact that the second key is more important than the first key, that is, if the second key is leaked out, the first key can be obtained with a lower time complexity than that of the expected security. In addition, we analyze the ability of the stream cipher to resist the guess-and-determine attack. The results show an attacker is able to gain the two keys with an exponentially improved time complexity and a polynomial data complexity. It implies that we need a securer permutation over finite fields to design a new binary additive stream cipher to achieve the expected security level.
引用
收藏
页码:210 / 218
页数:9
相关论文
共 50 条
  • [21] Encryption method and security analysis of medical images based on stream cipher enhanced logical mapping
    Liu, Shuang
    Liu, Li
    Pang, Ming
    TECHNOLOGY AND HEALTH CARE, 2021, 29 : S185 - S193
  • [22] Implementation and Comparative Analysis of AES as a Stream Cipher
    Zhou, Bin
    Peng, Yingning
    Gaj, Kris
    Zhou, Zhonghai
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2009, : 396 - +
  • [23] Differential Fault Analysis on Stream Cipher MUGI
    Takahashi, Junko
    Fukunaga, Toshinori
    Sakiyama, Kazuo
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (01) : 242 - 251
  • [24] Analysis and Improvements of the Full Spritz Stream Cipher
    Banik, Subhadeep
    Isobe, Takanori
    Morii, Masakatu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (06) : 1296 - 1305
  • [25] WALSH HADAMARD TRANSFORM AND CRYPTOGRAPHIC PROPERTIES IN STREAM CIPHER
    Girija, R.
    Kumar, Pramod
    Dr Meenakumari
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2016, : 199 - 203
  • [26] SECURITY EVALUATION AND ENCRYPTION EFFICIENCY ANALYSIS OF RC4 STREAM CIPHER FOR CONVERGED NETWORK APPLICATIONS
    Riad, Alaa E. Din
    Elminir, Hamdy K.
    Shehata, Alaa R.
    Ibrahim, Taha R.
    JOURNAL OF ELECTRICAL ENGINEERING-ELEKTROTECHNICKY CASOPIS, 2013, 64 (03): : 196 - 200
  • [27] The rabbit stream cipher
    Boesgaard, Martin
    Vesterager, Mette
    Zenner, Erik
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2008, 4986 LNCS : 69 - 83
  • [28] SAT based analysis of LTE stream cipher ZUC
    Lafitte, Frederic
    Markowitch, Olivier
    van Heule, Dirk
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 22 : 54 - 65
  • [29] Novel Analysis of Stream Cipher Combing LFSR and FCSR
    Dong, Lihua
    Wang, Jie
    Zhang, Shuo
    FRONTIERS IN CYBER SECURITY, 2018, 879 : 23 - 38
  • [30] Stream cipher design for MANets
    Delgado, Oscar
    Fuster, Amparo
    COMPUTATION IN MODERN SCIENCE AND ENGINEERING VOL 2, PTS A AND B, 2007, 2 : 965 - 968