Skip to main content

Lund University Publications

LUND UNIVERSITY LIBRARIES

Some Results on Distinguishing Attacks on Stream Ciphers

Englund, Håkan LU (2007)
Abstract
Stream ciphers are cryptographic primitives that are used to ensure the privacy of a message that is sent over a digital communication channel. In this thesis we will present new cryptanalytic results for several stream ciphers.



The thesis provides a general introduction to cryptology, explains the basic concepts, gives an overview of various cryptographic primitives and discusses a number of different attack models.



The first new attack given is a linear correlation attack in the form of a distinguishing attack. In this attack a specific class of weak feedback polynomials for LFSRs is identified. If the feedback polynomial is of a particular form the attack will be efficient.



Two... (More)
Stream ciphers are cryptographic primitives that are used to ensure the privacy of a message that is sent over a digital communication channel. In this thesis we will present new cryptanalytic results for several stream ciphers.



The thesis provides a general introduction to cryptology, explains the basic concepts, gives an overview of various cryptographic primitives and discusses a number of different attack models.



The first new attack given is a linear correlation attack in the form of a distinguishing attack. In this attack a specific class of weak feedback polynomials for LFSRs is identified. If the feedback polynomial is of a particular form the attack will be efficient.



Two new distinguishing attacks are given on classical stream cipher constructions, namely the filter generator and the irregularly clocked filter generator. It is also demonstrated how these attacks can be applied to modern constructions. A key recovery attack is described for LILI-128 and a distinguishing attack for LILI-II is given.



The European network of excellence, called eSTREAM, is an effort to find new efficient and secure stream ciphers. We analyze a number of the eSTREAM candidates. Firstly, distinguishing attacks are described for the candidate Dragon and a family of candidates called Pomaranch. Secondly, we describe resynchronization attacks on eSTREAM candidates. A general square root resynchronization attack which can be used to recover parts of a message is given. The attack is demonstrated on the candidates LEX and Pomaranch. A chosen IV distinguishing attack is then presented which can be used to evaluate the initialization procedure of stream ciphers. The technique is demonstrated on four candidates: Grain, Trivium, Decim and LEX. (Less)
Please use this url to cite or link to this publication:
author
supervisor
opponent
  • Professor Nyberg, Kaisa, Helsinki University of Technology, Finland
organization
publishing date
type
Thesis
publication status
published
subject
keywords
correlation attack, irregularly clocked filter generator, distinguishing attacks, Stream ciphers, filter generator, Pomaranch, Dragon, LILI-128, LILI-II
pages
184 pages
publisher
Electro and information technology
defense location
Room E:1406, E-building, Ole Römers väg 3, Lund University Faculty of Engineering
defense date
2007-12-14 13:15:00
ISBN
91-7167-046-7
language
English
LU publication?
yes
id
8a1d0aae-14af-43b9-8a21-14e2defa0919 (old id 609241)
date added to LUP
2016-04-04 11:57:18
date last changed
2018-11-21 21:08:10
@phdthesis{8a1d0aae-14af-43b9-8a21-14e2defa0919,
  abstract     = {{Stream ciphers are cryptographic primitives that are used to ensure the privacy of a message that is sent over a digital communication channel. In this thesis we will present new cryptanalytic results for several stream ciphers. <br/><br>
<br/><br>
The thesis provides a general introduction to cryptology, explains the basic concepts, gives an overview of various cryptographic primitives and discusses a number of different attack models.<br/><br>
<br/><br>
The first new attack given is a linear correlation attack in the form of a distinguishing attack. In this attack a specific class of weak feedback polynomials for LFSRs is identified. If the feedback polynomial is of a particular form the attack will be efficient.<br/><br>
<br/><br>
Two new distinguishing attacks are given on classical stream cipher constructions, namely the filter generator and the irregularly clocked filter generator. It is also demonstrated how these attacks can be applied to modern constructions. A key recovery attack is described for LILI-128 and a distinguishing attack for LILI-II is given.<br/><br>
<br/><br>
The European network of excellence, called eSTREAM, is an effort to find new efficient and secure stream ciphers. We analyze a number of the eSTREAM candidates. Firstly, distinguishing attacks are described for the candidate Dragon and a family of candidates called Pomaranch. Secondly, we describe resynchronization attacks on eSTREAM candidates. A general square root resynchronization attack which can be used to recover parts of a message is given. The attack is demonstrated on the candidates LEX and Pomaranch. A chosen IV distinguishing attack is then presented which can be used to evaluate the initialization procedure of stream ciphers. The technique is demonstrated on four candidates: Grain, Trivium, Decim and LEX.}},
  author       = {{Englund, Håkan}},
  isbn         = {{91-7167-046-7}},
  keywords     = {{correlation attack; irregularly clocked filter generator; distinguishing attacks; Stream ciphers; filter generator; Pomaranch; Dragon; LILI-128; LILI-II}},
  language     = {{eng}},
  publisher    = {{Electro and information technology}},
  school       = {{Lund University}},
  title        = {{Some Results on Distinguishing Attacks on Stream Ciphers}},
  url          = {{https://lup.lub.lu.se/search/files/5893712/609243.pdf}},
  year         = {{2007}},
}