In this report we analyze two specific ``distinguishing properties''. One is a linear approximation of the non-linear process, which we demonstrate on the stream cipher SNOW. This attack needs roughly $2^{95}$ words of output, with work-load of about $2^{100}$. The other is a ``low-diffusion'' attack, that we apply to the cipher Scream-0. The latter attack needs only about $2^{43}$ bytes of output, using roughly $2^{50}$ space and $2^{80}$ time.
Category / Keywords: secret-key cryptography / Hypothesis testing, Linear cryptanalysis, Linear masking, Low-Diffusion attacks, Stream ciphers Publication Info: extended abstract appears in Crypto'02 Date: received 16 Feb 2002, last revised 5 Jun 2002 Contact author: shaih at watson ibm com Available format(s): Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation Version: 20020605:204432 (All versions of this report) Short URL: ia.cr/2002/020 Discussion forum: Show discussion | Start new discussion