Provable security against generic attacks on stream ciphers
نویسندگان
چکیده
Abstract Recent lightweight hardware-based stream cipher designs keep an external non-volatile internal state that is not part of the cipher’s hardware module. The purpose these so-called small-state ciphers to size and power consumption low. We propose a random oracle model for ciphers. This will allow us analyse recent designs’ resistance against generic attacks and, in particular, time-memory-data tradeoff attacks. conventional construction underlying like Grain Trivium, constructions continuously using secret key during keystream generation Sprout, Plantlet, Fruit, Atom, IV, combination IV DRACO. show tightness all bounds by first presenting on respective constructions, establishing upper bound security, then proof security establish lower security. In this work, we extend theoretical work done Hamann et al. who introduced DRACO at FSE 2023. use same as aforementioned apply it earlier presented SAC 2019, which showed two four consider work. Our equivalent but allows much simpler Furthermore, provide generation, giving proposed so far.
منابع مشابه
On Stream Ciphers with Provable Beyond-the-Birthday-Bound Security against Time-Memory-Data Tradeoff Attacks
We propose and analyze the Lizard-construction, a way to construct keystream generator (KSG) based stream ciphers with provable 2 3 n-security with respect to generic time-memory-data tradeoff attacks. Note that for the vast majority of known practical KSG-based stream ciphers such attacks reduce the effective key length to the birthday bound n/2, where n denotes the inner state length of the u...
متن کاملOn the Applicability of Distinguishing Attacks Against Stream Ciphers
We demonstrate that the existence of distinguishing attacks against stream ciphers is unrelated to their security in practical use, and in particular that the amount of data required to perform a distinguishing attack is unrelated to the key length of the cipher. The implication for the NESSIE Project is that no submitted symmetric cipher would be accepted under the unpublished rules for distin...
متن کاملKey differentiation attacks on stream ciphers
In this paper the applicability of differential cryptanalytic tool to stream ciphers is elaborated using the algebraic representation similar to early Shannon’s postulates regarding the concept of confusion. In 2007, Biham and Dunkelman [3] have formally introduced the concept of differential cryptanalysis in stream ciphers by addressing the three different scenarios of interest. Here we mainly...
متن کاملLinearisation Attacks on FCSR-based Stream Ciphers
This paper presents a new class of cryptanalytic attacks, which are applicable against those binary additive synchronous stream ciphers, whose analysis theory is based on the properties of 2-adic numbers. These attacks are named as ‘Linearisation Attacks’. Linearisation attacks consist of three variants, which are referred as ‘Conventional Linearisation Attacks (CLAs)’, ‘Fast Linearisation Atta...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Mathematical Cryptology
سال: 2023
ISSN: ['1862-2984', '1862-2976']
DOI: https://doi.org/10.1515/jmc-2022-0033