Security Analysis of A Stream Cipher with Proven Properties

被引:1
作者
Juntao, Gao [1 ]
Xuelian, Li [2 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Xidian Univ, Sch Math & Stat, Xian 710071, Peoples R China
关键词
Stream cipher; Security analysis; Spectra attack; Guess‐ and‐ determine attack;
D O I
10.1049/cje.2021.01.002
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Si and Ding proposed a stream cipher with two keys (the first and the second key) and an expected security strength. To further measure the security, we analyze the stream cipher by considering the selective discrete Fourier spectra attack and the fast selective discrete Fourier spectra attack. The two attacks reveal a fact that the second key is more important than the first key, that is, if the second key is leaked out, the first key can be obtained with a lower time complexity than that of the expected security. In addition, we analyze the ability of the stream cipher to resist the guess-and-determine attack. The results show an attacker is able to gain the two keys with an exponentially improved time complexity and a polynomial data complexity. It implies that we need a securer permutation over finite fields to design a new binary additive stream cipher to achieve the expected security level.
引用
收藏
页码:210 / 218
页数:9
相关论文
共 50 条
  • [41] Measuring Avalanche Properties on RC4 Stream Cipher Variants
    Madarro-Capo, Evaristo Jose
    Legon-Perez, Carlos Miguel
    Rojas, Omar
    Sosa-Gomez, Guillermo
    APPLIED SCIENCES-BASEL, 2021, 11 (20):
  • [42] Stream cipher designs: a review
    Jiao, Lin
    Hao, Yonglin
    Feng, Dengguo
    SCIENCE CHINA-INFORMATION SCIENCES, 2020, 63 (03)
  • [43] A Novel Stream Cipher Based on Nondeterministic Finite Automata
    Khaleel, Ghassan
    Turaev, Sherzod
    Zhukabayeva, Tamara
    PROCEEDINGS OF THE 2016 CONFERENCE ON INFORMATION TECHNOLOGIES IN SCIENCE, MANAGEMENT, SOCIAL SPHERE AND MEDICINE (ITSMSSM), 2016, 51 : 110 - 115
  • [44] BRRC: A Hybrid Approach Using Block Cipher and Stream Cipher
    Kumar, Binay
    Hussain, Muzzammil
    Kumar, Vijay
    PROGRESS IN ADVANCED COMPUTING AND INTELLIGENT ENGINEERING, PROCEEDINGS OF ICACIE 2016, VOLUME 1, 2018, 563 : 221 - 231
  • [45] FPGA Implementation of hash key based stream cipher using NFSR and its security aspects
    Pandian, K. K. Soundra
    Ray, K. C.
    2016 INTERNATIONAL CONFERENCE ON COMPUTING, ANALYTICS AND SECURITY TRENDS (CAST), 2016, : 387 - 392
  • [46] Side-Channel Analysis of the K2 Stream Cipher
    Henricksen, Matt
    Yap, Wun She
    Yian, Chee Hoo
    Kiyomoto, Shinsaku
    Tanaka, Toshiaki
    INFORMATION SECURITY AND PRIVACY, 2010, 6168 : 53 - +
  • [47] Analysis of Message Injection in Stream Cipher-Based Hash Functions
    Nakano, Yuto
    Cid, Carlos
    Fukushima, Kazuhide
    Kiyomoto, Shinsaku
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2011), 2011, 6715 : 498 - 513
  • [48] The mathematical model and analysis of key generation for stream cipher on Ethernet LANs
    Hadjina, N
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL I, PROCEEDINGS: INFORMATION SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2003, : 76 - 81
  • [49] Hardware Implementation and Performance Analysis of NLM-128 Stream Cipher
    Lee, Soh Yee
    Lee, HoonJae
    CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, 2011, 206 : 446 - 453
  • [50] Rotational Cryptanalysis on ChaCha Stream Cipher
    Barbero, Stefano
    Bazzanella, Danilo
    Bellini, Emanuele
    SYMMETRY-BASEL, 2022, 14 (06):