Paper 2009/412
Distinguishing Attacks on Stream Ciphers Based on Arrays of Pseudo-random Words
Nathan Keller and Stephen D. Miller
Abstract
In numerous modern stream ciphers, the internal state consists of
a large array of pseudo-random words, and the output key-stream is
a relatively simple function of the state. In [Paul-Preneel],
it was heuristically shown that in various cases this structure
may lead to distinguishing attacks on the cipher. In this paper
we further investigate this structural attack. We present a
rigorous proof of the main probabilistic claim used in the attack
in the basic cases, and demonstrate by examining a concrete
example (the cipher SN3) that the heuristic
assumptions of the attack are remarkably precise in more
complicated cases. Furthermore, we use the general technique to
devise a distinguishing attack on the stream cipher
MV3 requiring
Metadata
- Available format(s)
-
PDF
- Category
- Public-key cryptography
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- stream cipherscryptanalysis
- Contact author(s)
- miller @ math rutgers edu
- History
- 2009-09-01: received
- Short URL
- https://ia.cr/2009/412
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2009/412, author = {Nathan Keller and Stephen D. Miller}, title = {Distinguishing Attacks on Stream Ciphers Based on Arrays of Pseudo-random Words}, howpublished = {Cryptology {ePrint} Archive, Paper 2009/412}, year = {2009}, url = {https://eprint.iacr.org/2009/412} }