Cryptology ePrint Archive: Report 2015/1174
On Data Complexity of Distinguishing Attacks vs. Message Recovery Attacks on Stream Ciphers
Goutam Paul and Souvik Ray
Abstract: We revisit the different approaches used in the literature to estimate
the data complexity of distinguishing attacks on stream ciphers and analyze their inter-relationships. In the process, we formally argue which approach is applicable (or not applicable) in what scenario. To our knowledge, this is the first kind of such an exposition. We also perform a rigorous statistical analysis of the message recovery attack that exploits a distinguisher and show that in practice there is a
significant gap between the data complexities of a message recovery attack and the underlying distinguishing attack. This gap is not necessarily determined by a constant factor as a function of the false positive and negative rate, as one would expect. Rather this gap is also a function of the number of samples of the distinguishing attack. We perform a case study on RC4 stream cipher to demonstrate that the typical complexities for message recovery attack inferred in the literature are but under-estimates and the actual estimates are quite larger.
Category / Keywords: secret-key cryptography / Data Complexity, Distinguisher, Distinguishing Attack, Message Recovery, Stream Cipher
Date: received 6 Dec 2015
Contact author: goutam paul at isical ac in
Available format(s): PDF | BibTeX Citation
Version: 20151208:215947 (All versions of this report)
Short URL: ia.cr/2015/1174
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]