The Differential Cryptanalysis and Design of Natural Stream Ciphers
نویسنده
چکیده
This paper introduces the differential cryptanalysis of additive stream ciphers, and develops its theoretical basis. The relationships between differential and other types of stream cipher analysis are presented. The conservation laws of patterns and of mutual information are derived. The cryptographic significance of pattern distribution of keystream sequences is shown. The cryptographic transformation densities are introduced, and their relations with other cryptographic factors are summarized. This work is illustrated by reference to the design and security of additive natural stream ciphers, which are nonlinear filtered sequences driven by a counter rather than by a shift register. 1 I n t r o d u c t i o n Stream ciphers have a long history and still play an important role in securing communications. Most of the literature on stream ciphers is about the design and analysis of synchronous stream ciphers, and especially additive synchronous stream ciphers, because of their relatively tractable structure. The main design problem of additive synchronous stream ciphers is producing a secure key stream generator. So far many kinds of generator have been proposed: nonlinearly-filtered LFSR generators [18], nonlinearly-combined LFSR generators [13, 25], multiplexer generators [17], threshhold generators [10], inner product generators [20], BBS generators [9], knapsack generators [27], Shamir's generators [28], counter generators [11], clock-controlled LFSR generators (survey in [16]), and the shrinking generator [6], to name only a few. Though there are some common security measures for every sequence generator (such as nonlinearity, linear complexity, sphere complexity [12] and 2-adic complexity [19]), every system has its own particular security problems. Though it may be generally said that cryptographic gains and losses usually go together, there are differences between cipher systems. Some are easy to implement, but may have tradeoffs between known security parameters; some are relatively difficult to implement, but their security may be easy to control; others may have both an easy implementation and ideal security, but be slow. Of course, fewer tradeoffs make for easier design. In designing secure cipher systems the most important problems are:
منابع مشابه
Cryptanalysis and Design of Stream Ciphers
This thesis presents some novel results on the cryptanalysis and design of stream ciphers. The first part of the thesis introduces various stream ciphers design and cryptanalysis techniques. The second part of the thesis gives the cryptanalysis of seven stream ciphers. The properties of addition are exploited in the cryptanalysis of two stream ciphers: the differential-linear cryptanalysis agai...
متن کاملA new method for accelerating impossible differential cryptanalysis and its application on LBlock
Impossible differential cryptanalysis, the extension of differential cryptanalysis, is one of the most efficient attacks against block ciphers. This cryptanalysis method has been applied to most of the block ciphers and has shown significant results. Using structures, key schedule considerations, early abort, and pre-computation are some common methods to reduce complexities of this attack. In ...
متن کاملImpossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version)
Impossible differential attack is a well-known mean to examine robustness of block ciphers. Using impossible differ- ential cryptanalysis, we analyze security of a family of lightweight block ciphers, named Midori, that are designed considering low energy consumption. Midori state size can be either 64 bits for Midori64 or 128 bits for Midori128; however, both vers...
متن کاملCryptanalysis of the Two-Dimensional Circulation Encryption Algorithm
In symmetric-key cryptography, two parties share a secret key K to encrypt messages using a cipher. Symmetric encryption techniques are used to efficiently encrypt data. Two common types of ciphers are commonly used nowadays: block ciphers and stream ciphers. Block ciphers encrypt blocks of data (typically 64 or 128 bits) in a fixed key-dependent way. The design of block ciphers is a well-studi...
متن کاملDifferential Cryptanalysis in Stream Ciphers
In this paper we present a general framework for the application of the ideas of differential cryptanalysis to stream ciphers. We demonstrate that some differences in the key (or the initial state or the plaintext) are likely to cause predicted differences in the key stream or in the internal state. These stream differences can then be used to analyze the internal state of the cipher and retrie...
متن کامل