Some Results on Distinguishing Attacks on Stream Ciphers
(2007)- Abstract
- Stream ciphers are cryptographic primitives that are used to ensure the privacy of a message that is sent over a digital communication channel. In this thesis we will present new cryptanalytic results for several stream ciphers.
The thesis provides a general introduction to cryptology, explains the basic concepts, gives an overview of various cryptographic primitives and discusses a number of different attack models.
The first new attack given is a linear correlation attack in the form of a distinguishing attack. In this attack a specific class of weak feedback polynomials for LFSRs is identified. If the feedback polynomial is of a particular form the attack will be efficient.
Two... (More) - Stream ciphers are cryptographic primitives that are used to ensure the privacy of a message that is sent over a digital communication channel. In this thesis we will present new cryptanalytic results for several stream ciphers.
The thesis provides a general introduction to cryptology, explains the basic concepts, gives an overview of various cryptographic primitives and discusses a number of different attack models.
The first new attack given is a linear correlation attack in the form of a distinguishing attack. In this attack a specific class of weak feedback polynomials for LFSRs is identified. If the feedback polynomial is of a particular form the attack will be efficient.
Two new distinguishing attacks are given on classical stream cipher constructions, namely the filter generator and the irregularly clocked filter generator. It is also demonstrated how these attacks can be applied to modern constructions. A key recovery attack is described for LILI-128 and a distinguishing attack for LILI-II is given.
The European network of excellence, called eSTREAM, is an effort to find new efficient and secure stream ciphers. We analyze a number of the eSTREAM candidates. Firstly, distinguishing attacks are described for the candidate Dragon and a family of candidates called Pomaranch. Secondly, we describe resynchronization attacks on eSTREAM candidates. A general square root resynchronization attack which can be used to recover parts of a message is given. The attack is demonstrated on the candidates LEX and Pomaranch. A chosen IV distinguishing attack is then presented which can be used to evaluate the initialization procedure of stream ciphers. The technique is demonstrated on four candidates: Grain, Trivium, Decim and LEX. (Less)
Please use this url to cite or link to this publication:
https://lup.lub.lu.se/record/609241
- author
- Englund, Håkan LU
- supervisor
- opponent
-
- Professor Nyberg, Kaisa, Helsinki University of Technology, Finland
- organization
- publishing date
- 2007
- type
- Thesis
- publication status
- published
- subject
- keywords
- correlation attack, irregularly clocked filter generator, distinguishing attacks, Stream ciphers, filter generator, Pomaranch, Dragon, LILI-128, LILI-II
- pages
- 184 pages
- publisher
- Electro and information technology
- defense location
- Room E:1406, E-building, Ole Römers väg 3, Lund University Faculty of Engineering
- defense date
- 2007-12-14 13:15:00
- ISBN
- 91-7167-046-7
- language
- English
- LU publication?
- yes
- id
- 8a1d0aae-14af-43b9-8a21-14e2defa0919 (old id 609241)
- date added to LUP
- 2016-04-04 11:57:18
- date last changed
- 2018-11-21 21:08:10
@phdthesis{8a1d0aae-14af-43b9-8a21-14e2defa0919, abstract = {{Stream ciphers are cryptographic primitives that are used to ensure the privacy of a message that is sent over a digital communication channel. In this thesis we will present new cryptanalytic results for several stream ciphers. <br/><br> <br/><br> The thesis provides a general introduction to cryptology, explains the basic concepts, gives an overview of various cryptographic primitives and discusses a number of different attack models.<br/><br> <br/><br> The first new attack given is a linear correlation attack in the form of a distinguishing attack. In this attack a specific class of weak feedback polynomials for LFSRs is identified. If the feedback polynomial is of a particular form the attack will be efficient.<br/><br> <br/><br> Two new distinguishing attacks are given on classical stream cipher constructions, namely the filter generator and the irregularly clocked filter generator. It is also demonstrated how these attacks can be applied to modern constructions. A key recovery attack is described for LILI-128 and a distinguishing attack for LILI-II is given.<br/><br> <br/><br> The European network of excellence, called eSTREAM, is an effort to find new efficient and secure stream ciphers. We analyze a number of the eSTREAM candidates. Firstly, distinguishing attacks are described for the candidate Dragon and a family of candidates called Pomaranch. Secondly, we describe resynchronization attacks on eSTREAM candidates. A general square root resynchronization attack which can be used to recover parts of a message is given. The attack is demonstrated on the candidates LEX and Pomaranch. A chosen IV distinguishing attack is then presented which can be used to evaluate the initialization procedure of stream ciphers. The technique is demonstrated on four candidates: Grain, Trivium, Decim and LEX.}}, author = {{Englund, Håkan}}, isbn = {{91-7167-046-7}}, keywords = {{correlation attack; irregularly clocked filter generator; distinguishing attacks; Stream ciphers; filter generator; Pomaranch; Dragon; LILI-128; LILI-II}}, language = {{eng}}, publisher = {{Electro and information technology}}, school = {{Lund University}}, title = {{Some Results on Distinguishing Attacks on Stream Ciphers}}, url = {{https://lup.lub.lu.se/search/files/5893712/609243.pdf}}, year = {{2007}}, }