Paper 2019/287
Security Evaluation for Snow 2.0-like Stream Ciphers Against Correlation Attacks over Extension Fields
A. N. Alekseychuk, S. M. Koniushok, and M. V. Poremskyi
Abstract
We propose a general method for security evaluation of SNOW 2.0-like ciphers against correlation attacks that are built similarly to known attacks on SNOW 2.0. Unlike previously known methods, the method we propose is targeted at security proof and allows obtaining lower bounds for efficiency of attacks from the class under consideration directly using parameters of stream cipher components similarly to techniques for security proofs of block ciphers against linear cryptanalysis. The method proposed is based upon automata-theoretic approach to evaluation the imbalance of discrete functions. In particular, we obtain a matrix representation and upper bounds for imbalance of an arbitrary discrete function being realized by a sequence of finite automata. These results generalize a number of previously known statements on matrix (linear) representations for imbalance of functions having specified forms, and may be applied to security proofs for other stream ciphers against correlation attacks. Application of this method to SNOW 2.0 and Strumok ciphers shows that any of the considered correlation attacks on them over the field of the order 256 has an average time complexity not less than $2^{146.20}$ and $2^{249.40}$ respectively, and requires not less than $2^{142.77}$ and, respectively, $2^{249.38}$ keystream symbols.
Metadata
- Available format(s)
- Category
- Secret-key cryptography
- Publication info
- Preprint. MINOR revision.
- Keywords
- symmetric cryptographystream ciphercorrelation attacksystem of noised linear equationsdiscrete Fourier transformproof of securitySNOW 2.0Strumok.
- Contact author(s)
-
alex-dtn @ ukr net
3tooth @ iszzi kpi ua
undermyclouds @ gmail com - History
- 2019-12-18: last of 2 revisions
- 2019-03-19: received
- See all versions
- Short URL
- https://ia.cr/2019/287
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2019/287, author = {A. N. Alekseychuk and S. M. Koniushok and M. V. Poremskyi}, title = {Security Evaluation for Snow 2.0-like Stream Ciphers Against Correlation Attacks over Extension Fields}, howpublished = {Cryptology {ePrint} Archive, Paper 2019/287}, year = {2019}, url = {https://eprint.iacr.org/2019/287} }