Security Analysis of A Stream Cipher with Proven Properties

被引:1
作者
Juntao, Gao [1 ]
Xuelian, Li [2 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Xidian Univ, Sch Math & Stat, Xian 710071, Peoples R China
关键词
Stream cipher; Security analysis; Spectra attack; Guess‐ and‐ determine attack;
D O I
10.1049/cje.2021.01.002
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Si and Ding proposed a stream cipher with two keys (the first and the second key) and an expected security strength. To further measure the security, we analyze the stream cipher by considering the selective discrete Fourier spectra attack and the fast selective discrete Fourier spectra attack. The two attacks reveal a fact that the second key is more important than the first key, that is, if the second key is leaked out, the first key can be obtained with a lower time complexity than that of the expected security. In addition, we analyze the ability of the stream cipher to resist the guess-and-determine attack. The results show an attacker is able to gain the two keys with an exponentially improved time complexity and a polynomial data complexity. It implies that we need a securer permutation over finite fields to design a new binary additive stream cipher to achieve the expected security level.
引用
收藏
页码:210 / 218
页数:9
相关论文
共 50 条
  • [31] Cryptanalysis of chaotic stream cipher
    Skrobek, Adrian
    PHYSICS LETTERS A, 2007, 363 (1-2) : 84 - 90
  • [32] Fuzzy Stream Cipher System
    Anikin, Igor V.
    Alnajjar, Khaled
    2015 INTERNATIONAL SIBERIAN CONFERENCE ON CONTROL AND COMMUNICATIONS (SIBCON), 2015,
  • [33] Quality Analysis of a Chaotic and Hopping Stream Based Cipher Image
    Sathishkumar, G. A.
    Bhoopathybagan, K.
    Sriraam, N.
    ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PT I, 2011, 131 : 307 - +
  • [34] Fault Analysis of the Stream Cipher Snow 3G
    Debraize, Blandine
    Corbella, Irene Marquez
    PROCEEDINGS OF THE 2009 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2009), 2009, : 103 - +
  • [35] Stream cipher designs: a review
    Lin JIAO
    Yonglin HAO
    Dengguo FENG
    Science China(Information Sciences), 2020, 63 (03) : 80 - 104
  • [36] Fault Analysis of the Stream Cipher Snow 3G
    Debraize, Blandine
    Corbella, Irene Marquez
    2009 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2009), 2009, : 103 - +
  • [37] Cryptanalysis of Loiss Stream Cipher
    Ding, Lin
    Guan, Jie
    COMPUTER JOURNAL, 2012, 55 (10) : 1192 - 1201
  • [38] Vectorization on ChaCha Stream Cipher
    Goll, Martin
    Gueron, Shay
    2014 11TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS (ITNG), 2014, : 612 - 615
  • [39] Stream cipher designs: a review
    Lin Jiao
    Yonglin Hao
    Dengguo Feng
    Science China Information Sciences, 2020, 63
  • [40] Cryptanalysis of the GST stream cipher
    Lee, I
    Simmons, S
    Tavares, S
    CCECE 2003: CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, PROCEEDINGS: TOWARD A CARING AND HUMANE TECHNOLOGY, 2003, : 1789 - 1794