Distinguishing attacks on stream ciphers based on arrays of pseudo-random words

被引:0
作者
Keller, Nathan [2 ]
Miller, Stephen D. [1 ]
机构
[1] Rutgers State Univ, Dept Math, Piscataway, NJ 08854 USA
[2] Hebrew Univ Jerusalem, Dept Math, IL-91904 Jerusalem, Israel
基金
美国国家科学基金会;
关键词
Cryptography; Stream ciphers; Distinguishing attacks; MV3; SN3;
D O I
10.1016/j.ipl.2009.11.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
in numerous modern stream ciphers, the internal state consists of a large array of pseudo-random words, while the Output key-stream is a relatively simple function of the state. It has been heuristically shown in several situations [3,8-11,14] that this structure may lead to distinguishing attacks on the cipher. In this note we present a more rigorous treatment of this structural attack. First, we present a rigorous proof of the main probabilistic claim behind it in the basic cases. We then apply it concretely to the cipher SN3 [12], and demonstrate that the heuristic assumptions of the attack are remarkably precise in more complicated cases. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:129 / 132
页数:4