You are looking at a specific version 20190319:135335 of this paper. See the latest version.

Paper 2019/287

Security Evaluation for Snow 2.0-like Stream Ciphers Against Correlation Attacks over Extension Fields

A. N. Alekseychuk and S. M. Koniushok and M. V. Poremskyi

Abstract

We propose a general method for security evaluation of SNOW 2.0-like ciphers against correlation attacks that are built similarly to known attacks on SNOW 2.0. Unlike previously known methods, the method we propose is targeted at security proof and allows obtaining lower bounds for efficiency of attacks from the class under consideration directly using parameters of stream cipher components similarly to techniques for security proofs of block ciphers against linear cryptanalysis. The method proposed is based upon automata-theoretic approach to evaluation the imbalance of discrete functions. In particular, we obtain a matrix representation and upper bounds for imbalance of an arbitrary discrete function being realized by a sequence of finite automata. These results generalize a number of previously known statements on matrix (linear) representations for imbalance of functions having specified forms, and may be applied to security proofs for other stream ciphers against correlation attacks. Application of this method to SNOW 2.0 and Strumok ciphers shows that any of the considered correlation attacks on them over the field of the order 256 has an average time complexity not less than $2^{146.20}$ and $2^{249.40}$ respectively, and requires not less than $2^{142.77}$ and, respectively, $2^{249.38}$ keystream symbols.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
symmetric cryptographystream ciphercorrelation attacksystem of noised linear equationsdiscrete Fourier transformproof of securitySNOW 2.0Strumok.
Contact author(s)
alex-dtn @ ukr net,3tooth @ iszzi kpi ua,undermyclouds @ gmail com
History
2019-12-18: last of 2 revisions
2019-03-19: received
See all versions
Short URL
https://ia.cr/2019/287
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.