A Security Evaluation of Whitenoise

نویسنده

  • David A. Wagner
چکیده

This report studies the security of Whitenoise, a stream cipher invented by BSB Utilities Inc. I present the results of a limited time analysis of this scheme. After a careful security analysis, I was unable to find any security weaknesses in the Whitenoise stream cipher. Whitenoise resists all of the attack methods I was able to think of. This provides evidence for the security of Whitenoise. To be sure, this is not a guarantee that Whitenoise is secure. It is possible that someone else might be able to find some weakness that I overlooked. Cryptographic canon is that no new algorithm should be deployed until it has been examined carefully by many qualified cryptanalysts. For this reason, it would be premature to deploy Whitenoise in new systems at this point. However, the security analysis conducted in this study is an important first step in the process of gaining confidence in the quality of the Whitenoise stream cipher. My analysis does provide considerable evidence that Whitenoise is worth further study; it appears to be a serious candidate, and in my opinion, it deserves to be further vetted by the security community at large.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evaluation of Whitenoise Cryptosystem Part 1: Encryption Algorithm

1 This report describes the first part of the evaluation of the Whitenoise cryptosystem. The second part of the evaluation is related to the evaluation of the key management facility.

متن کامل

Breaking the Stream Cipher Whitenoise

Whitenoise is a stream cipher with specification given at http://eprint.iacr.org/2003/249. In this paper, we show that Whitenoise is extremely weak. It can be broken by solving about 80,000 linear equations. And only about 80,000 bytes keystream are needed in the attack.

متن کامل

Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory

Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...

متن کامل

Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry

Providing security in the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both te...

متن کامل

Whitenoise Encryption Implementation with Increased Robustness against Side-Channel Attacks

Two circuit design techniques improve the robustness of Whitenoise encryption algorithm implementation against side-channel attacks based on dynamic and/or static power consumption. The first technique aims to conceal the power consumption and has linear cost. The second technique aims to randomize the power consumption and has quadratic cost. These techniques are not mutual exclusive; their sy...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2003  شماره 

صفحات  -

تاریخ انتشار 2003