Distinguishing attacks on stream ciphers based on arrays of pseudo-random words

被引:0
|
作者
Keller, Nathan [2 ]
Miller, Stephen D. [1 ]
机构
[1] Rutgers State Univ, Dept Math, Piscataway, NJ 08854 USA
[2] Hebrew Univ Jerusalem, Dept Math, IL-91904 Jerusalem, Israel
基金
美国国家科学基金会;
关键词
Cryptography; Stream ciphers; Distinguishing attacks; MV3; SN3;
D O I
10.1016/j.ipl.2009.11.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
in numerous modern stream ciphers, the internal state consists of a large array of pseudo-random words, while the Output key-stream is a relatively simple function of the state. It has been heuristically shown in several situations [3,8-11,14] that this structure may lead to distinguishing attacks on the cipher. In this note we present a more rigorous treatment of this structural attack. First, we present a rigorous proof of the main probabilistic claim behind it in the basic cases. We then apply it concretely to the cipher SN3 [12], and demonstrate that the heuristic assumptions of the attack are remarkably precise in more complicated cases. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:129 / 132
页数:4
相关论文
共 31 条
  • [1] An overview of distinguishing attacks on stream ciphers
    Hell, Martin
    Johansson, Thomas
    Brynielsson, Lennart
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2009, 1 (01): : 71 - 94
  • [2] An overview of distinguishing attacks on stream ciphers
    Martin Hell
    Thomas Johansson
    Lennart Brynielsson
    Cryptography and Communications, 2009, 1 : 71 - 94
  • [3] Differential Random Fault Attacks on Certain CAESAR Stream Ciphers
    Wong, Kenneth Koon-Ho
    Bartlett, Harry
    Simpson, Leonie
    Dawson, Ed
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2019, 2020, 11975 : 297 - 315
  • [4] Multivariate correlation attacks and the cryptanalysis of LFSR-based stream ciphers
    Canales-Martinez, Isaac A.
    Semaev, Igor
    DESIGNS CODES AND CRYPTOGRAPHY, 2024, 92 (11) : 3391 - 3427
  • [5] New Distinguishers Based on Random Mappings against Stream Ciphers
    Turan, Meltem Soenmez
    Calik, Cagdas
    Saran, Nurdan Buz
    Doganaksoy, Ali
    SEQUENCES AND THEIR APPLICATIONS - SETA 2008, 2008, 5203 : 30 - +
  • [6] Pseudo-random number generator based on asymptotic deterministic randomness
    Wang, Kai
    Pei, Wenjiang
    Xia, Haishan
    Cheung, Yiu-ming
    PHYSICS LETTERS A, 2008, 372 (24) : 4388 - 4394
  • [7] PSEUDO-RANDOM PATTERN BASED CRYPTOGRAPHY WITH USING CELLULAR LEARNING AUTOMATA
    Dezfuly, Atefeh Ghalambor
    Setayeshi, Saeid
    Mosleh, Mohammad
    FOURTH INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING (ICCEE 2011), 2011, : 327 - +
  • [8] A Chaotic Neural Network Based Cryptographic Pseudo-Random Sequence Design
    Singla, Prateek
    Sachdeva, Payal
    Ahmad, Musheer
    2014 FOURTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION TECHNOLOGIES (ACCT 2014), 2014, : 301 - 306
  • [9] Pseudo-random number generator based on mixing of three chaotic maps
    Francois, M.
    Grosges, T.
    Barchiesi, D.
    Erra, R.
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2014, 19 (04) : 887 - 895
  • [10] Lightweight image encryption based on composite pseudo-random number generator
    Kumar, Deepak
    Mondal, Bhaskar
    Singh, Jyoti Prakash
    JOURNAL OF ELECTRONIC IMAGING, 2024, 33 (02)