Provable security against generic attacks on stream ciphers

نویسندگان

چکیده

Abstract Recent lightweight hardware-based stream cipher designs keep an external non-volatile internal state that is not part of the cipher’s hardware module. The purpose these so-called small-state ciphers to size and power consumption low. We propose a random oracle model for ciphers. This will allow us analyse recent designs’ resistance against generic attacks and, in particular, time-memory-data tradeoff attacks. conventional construction underlying like Grain Trivium, constructions continuously using secret key during keystream generation Sprout, Plantlet, Fruit, Atom, IV, combination IV DRACO. show tightness all bounds by first presenting on respective constructions, establishing upper bound security, then proof security establish lower security. In this work, we extend theoretical work done Hamann et al. who introduced DRACO at FSE 2023. use same as aforementioned apply it earlier presented SAC 2019, which showed two four consider work. Our equivalent but allows much simpler Furthermore, provide generation, giving proposed so far.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On Stream Ciphers with Provable Beyond-the-Birthday-Bound Security against Time-Memory-Data Tradeoff Attacks

We propose and analyze the Lizard-construction, a way to construct keystream generator (KSG) based stream ciphers with provable 2 3 n-security with respect to generic time-memory-data tradeoff attacks. Note that for the vast majority of known practical KSG-based stream ciphers such attacks reduce the effective key length to the birthday bound n/2, where n denotes the inner state length of the u...

متن کامل

On the Applicability of Distinguishing Attacks Against Stream Ciphers

We demonstrate that the existence of distinguishing attacks against stream ciphers is unrelated to their security in practical use, and in particular that the amount of data required to perform a distinguishing attack is unrelated to the key length of the cipher. The implication for the NESSIE Project is that no submitted symmetric cipher would be accepted under the unpublished rules for distin...

متن کامل

Key differentiation attacks on stream ciphers

In this paper the applicability of differential cryptanalytic tool to stream ciphers is elaborated using the algebraic representation similar to early Shannon’s postulates regarding the concept of confusion. In 2007, Biham and Dunkelman [3] have formally introduced the concept of differential cryptanalysis in stream ciphers by addressing the three different scenarios of interest. Here we mainly...

متن کامل

Linearisation Attacks on FCSR-based Stream Ciphers

This paper presents a new class of cryptanalytic attacks, which are applicable against those binary additive synchronous stream ciphers, whose analysis theory is based on the properties of 2-adic numbers. These attacks are named as ‘Linearisation Attacks’. Linearisation attacks consist of three variants, which are referred as ‘Conventional Linearisation Attacks (CLAs)’, ‘Fast Linearisation Atta...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Mathematical Cryptology

سال: 2023

ISSN: ['1862-2984', '1862-2976']

DOI: https://doi.org/10.1515/jmc-2022-0033