Paper 2008/443
Key differentiation attacks on stream ciphers
Enes Pasalic
Abstract
In this paper the applicability of differential cryptanalytic tool to stream
ciphers is elaborated using the algebraic representation similar to
early Shannon's postulates regarding the concept of confusion. In
2007, Biham and Dunkelman \cite{BihDunk}
have formally introduced the concept of differential
cryptanalysis in stream ciphers by addressing the three different
scenarios of interest. Here we mainly consider the first scenario
where the key difference and/or IV difference influence the internal
state of the cipher
Note: The original submission contains a small error overlooked by the author, which though substantially impact the application of the attack on Trivium. Namely, due to the appearance of the same subset of key bits for which linear relations exist, the original attack is not directly applicable to Trivium. Modified version of attack is added. This implies that Trivium is still theoretically sound, though the modified version of attack requires an optimal key/IV mixture in the KSA of Trivium to resist the attack. Computer simulations (time demanding ) are currently in progress that will finally answer how many rounds of reduced setup we can attack.
Metadata
- Available format(s)
-
PDF
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- Key related attacksChosen IV attacksKey differentiationTrivium
- Contact author(s)
- enespasalic @ yahoo se
- History
- 2008-12-05: revised
- 2008-10-20: received
- See all versions
- Short URL
- https://ia.cr/2008/443
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2008/443, author = {Enes Pasalic}, title = {Key differentiation attacks on stream ciphers}, howpublished = {Cryptology {ePrint} Archive, Paper 2008/443}, year = {2008}, url = {https://eprint.iacr.org/2008/443} }