Cryptanalysis of Stream Cipher

Total Page:16

File Type:pdf, Size:1020Kb

Cryptanalysis of Stream Cipher Differential-Linear Attacks against the Stream Cipher Phelix Hongjun Wu and Bart Preneel Katholieke Universiteit Leuven ESAT/COSIC Overview 1. Introduction to Helix and Phelix 2. Description of Phelix 3. Differential propagation of addition 4. A basic attack on Phelix 5. Improving the attack on Phelix 6. Improving the security of Phelix 7. Open problems 8. Conclusion K.U. Leuven, ESAT/COSIC 2 1 Background (1) Stream Cipher Helix (FSE 2003) stream cipher + message authentication message is applied to update the internal state encryption: message is XORed with the keystream MAC: generated from internal state after finishing encryption gain – no separate MAC cost – error propagation + security concern K.U. Leuven, ESAT/COSIC 3 1 Background (2) Attacks against Helix Differential key recovery attack (Muller, 2004): nonce reuse; 212 adaptively chosen plaintext words, 288 operations Reducing the number of plaintext words (Paul-Preneel, 2005) about 210 adaptively chosen plaintext words; or 235.6 chosen plaintext words K.U. Leuven, ESAT/COSIC 4 1. Background (3) Stream Cipher Phelix (2005) Phelix: the strengthened version of Helix 1) message passing through more operations before affecting the keystream: half block in Helix, one full block in Phelix 2) more internal state words in generating a keystream word: one internal state word in Helix, two in Phelix Is Phelix secure? Still vulnerable to the differential key recovery attack, effective key size being reduced to 41.5 bits K.U. Leuven, ESAT/COSIC 5 2. Stream Cipher Phelix (1) Stream Cipher Phelix stream cipher + message authentication code 256-bit key, 128-bit IV eSTREAM Phase II software and hardware focus cipher Fast in software: 6.6 cycles/byte on Pentium M processor Hardware: twelve 32-bit additions are required for one 32-bit keystream word: efficient ? K.U. Leuven, ESAT/COSIC 6 2. Stream Cipher Phelix (2) Stream Cipher Phelix 160-bit internal state: updated by message 512-bit internal state: simply related to the key and IV incremented during the encryption K.U. Leuven, ESAT/COSIC 7 Phelix: one block Z0, Z1, Z2, Z3, Z4 : 160-bit internal state updated by message Xi,0, Xi,1 : 512-bit internal state, determined by key, IV; Encryption: Ci = Pi ⊕ Si K.U. Leuven, ESAT/COSIC 8 3. Differential Propagation of Addition Observation: addend bits strongly correlated with the difference of the sums => By observing the distribution of the difference of the sums, the value of addend bits can be determined with the linear attack technique K.U. Leuven, ESAT/COSIC 9 3. Differential Propagation of Addition The following theorem shows that the check sum of two adjacent addend bits does affect significantly the distribution of the difference of the sums K.U. Leuven, ESAT/COSIC 10 4. A Basic Attack on Phelix (1) 1) Introducing one bit difference in Pi (i+1) (i+1) 2) B 3 ⊕ B 3′ heavily biased K.U. Leuven, ESAT/COSIC 11 4. A Basic Attack on Phelix (2) (i+1) (i+1) (i+1) (i+1) (i+1) 3) Since T 0 = A 0 ⊕ ( B 3 + X i + 1 ,0 ) and that B 3 ⊕ B3′ is heavily biased, we can predict which bits of Xi+1,0 may have significant effect on the distribution of the difference of the keystream according to Theorem 2. K.U. Leuven, ESAT/COSIC 12 4. A Basic Attack on Phelix (3) 4) When the one-bit difference is in the least significant bit of 15 14 th Pi , for X i + 1 ,0 ⊕ X i + 1 ,0 = 0 , the 17 least significant bit of 15 14 Si+1 ⊕ Si′+1 is 0 with probability 0.50227; for X i + 1 ,0 ⊕ X i + 1 , 0 = 1 , the probability is 0.50117 15 14 => The value of X i + 1 , 0 ⊕ X i + 1 , 0 is highly correlated to the 17 17 distribution of S i + 1 ⊕ S i′ + 1 . 15 14 22.3 => Recovering X i + 1 , 0 ⊕ X i + 1 , 0 with 2 plaintext pairs K.U. Leuven, ESAT/COSIC 13 4. A Basic Attack on Phelix (4) Experiment 1. With 225 chosen plaintext pairs with difference in 15 14 the least significant bit of Pi, the values of X i + 1 , 0 ⊕ X i + 1 ,0 of 192 keys among 200 keys are determined correctly. The success rate is about 0.96. Lower than expected. 15 14 Reason: the other bits of X i + 1 ,0 interfere with X i+1,0 ⊕ X i+1,0 Shifting the one-bit difference, 23 bits of X i+ 1 , 0 are recovered. K.U. Leuven, ESAT/COSIC 14 5. Improving the Attack on Phelix (1) Aims: Recovering more key bits and improving the success rate Reducing the number of chosen plaintext pairs Methods: (i−3) Recovering Z 4 before recovering X i+1,0 Fine tuning of the threshold values in the attack K.U. Leuven, ESAT/COSIC 15 5. Improving the Attack on Phelix (2) (i−3) Recovering Z4 1) Introducing difference in the least significant bit of Pi (i+1) (i+1) 2) Y 4 ⊕ Y 4 ′ is heavily biased K.U. Leuven, ESAT/COSIC 16 5. Improving the Attack on Phelix (3) (i+1) (i+1) (i+1) (i−3) 3) Since Y 4 ⊕ Y 4′ is heavily biased and S i+ 1 = Y4 ⊕ Z4 , (i−3) the value of the bits of Z 4 affects the distribution of Si+1 ⊕ Si′+1 (i+1),3 (i+1),2 th 4) When P i ⊕ P i ′ = 1 , for Y 4 ⊕ Y 4 = 0 , the 5 least significant bit of S i − 3 ⊕ S i′ − 3 is 0 with probability 0.5461; (i+1),3 (i+1),2 for Y 4 ⊕ Y 4 = 1 , this probability is 0.5193 (i+1),3 (i+1),2 14 => Recovering Y 4 ⊕ Y 4 requires 2 plaintext pairs K.U. Leuven, ESAT/COSIC 17 5. Improving the Attack on Phelix (4) 5) In the attack, we determine the least significant bit of (i−3) first, then proceed to determine the more significant Z4 (i−3) bits of Z 4 by shifting the one-bit difference. (i−3), j (i−3), j−1 (i−3), j−2 (i−3),0 6) When Z 4 is analyzed, Z 4 Z 4 LZ4 is ′ (i−3), j−1 (i−3), j−2 (i−3),0 subtracted from S i and S i so that Z4 Z4 LZ4 (i−3), j does not interfere with Z 4 . The success rate becomes very close to 1 with small number of plaintext pairs. K.U. Leuven, ESAT/COSIC 18 5. Improving the Attack on Phelix (5) 17 (i−3) 7) With 2 plaintext pairs, 30 bits of Z 4 (except the two (i−3) most significant bits of Z 4 ) can be determined with success rate about 0.999. (i−3) After recovering Z 4 , we recover X i + 1 ,0 from the (i+1) (i+1) ′ distribution of Y 4 ⊕ Y ' 4 instead of S i+ 1 ⊕ Si+1 . K.U. Leuven, ESAT/COSIC 19 5. Improving the Attack on Phelix (6) (i+1) (i+1) Recovering X i + 1 , 0 from Y4 ⊕Y4′ Due to the interference between the bits of X i + 1 ,0 on the i+1 i+1 distribution of Y 4 ⊕ Y 4′ , we need the fine tuning of the threshold values in the attack. 9 For example, when P i ⊕ P i ′ = 1 , if X i+ 1 , 0 = 0 and the value of 11 10 i+1,13 i+1,13 X i+1,0 || X i+1,0 is 00, 11, 01, 10, then Y 4 ⊕ Y 4 ′ = 0 with prob. 9 0.53033, 0.52334, 0.51946, 0.51864; if X i + 1 ,0 = 1 , the prob. becomes 0.52334, 0.53030, 0.51861, 0.51948. 9 11 10 Y i+1,13 ⊕Y ′i+1,13 => X i + 1 ,0 and X i + 1 ,0 || X i+ 1 , 0 affect the distribution of 4 4 K.U. Leuven, ESAT/COSIC 20 5. Improving the Attack on Phelix (7) i+1,13 i+1,13 Other bits of X i + 1 , 0 also affect the distribution of Y4 ⊕Y4′ In the attack, we need to tune the threshold value to 0.52035, 11 10 so that the value of X i+ 1 , 0 ⊕ X i + 1 , 0 can be recovered with success rate 0.99 with 221 chosen plaintext pairs. j+1 j The values of X i + 1 , 0 ⊕ X i + 1 , 0 ( 2 ≤ j ≤ 28 ) can be determined in a similar way K.U. Leuven, ESAT/COSIC 21 5. Improving the Attack on Phelix (8) 0 The lsb X i+1,0 is recovered in a different way: 16 21 2 chosen plaintext pairs with Pi ⊕ Pi′= 2 (i+1),2 (i+1),2 observing the distribution of Y4 ⊕Y4′ 1 0 The second lsb X i+1,0 can be recovered if X i+1,0 = 0 16.4 22 2 chosen plaintext pairs with Pi ⊕ Pi′= 2 (i+1),3 (i+1),3 observing the distribution of Y4 ⊕Y4′ X 2 0 1 The value of i + 1 ,0 can be recovered if X i + 1 ,0 = 0 and X i+1,0 = 0 K.U. Leuven, ESAT/COSIC 22 5. Improving the Attack on Phelix (9) The above attack recovers 28.75 bits of X i+1,0 After recovering eight consecutive X i + 1 , 0 , 230 key bits are recovered. Considering the error rate of about 0.01, the effective key size is reduced to 41.5 bits.
Recommended publications
  • Failures of Secret-Key Cryptography D
    Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago & Technische Universiteit Eindhoven http://xkcd.com/538/ 2011 Grigg{Gutmann: In the past 15 years \no one ever lost money to an attack on a properly designed cryptosystem (meaning one that didn't use homebrew crypto or toy keys) in the Internet or commercial worlds". 2011 Grigg{Gutmann: In the past 15 years \no one ever lost money to an attack on a properly designed cryptosystem (meaning one that didn't use homebrew crypto or toy keys) in the Internet or commercial worlds". 2002 Shamir:\Cryptography is usually bypassed. I am not aware of any major world-class security system employing cryptography in which the hackers penetrated the system by actually going through the cryptanalysis." Do these people mean that it's actually infeasible to break real-world crypto? Do these people mean that it's actually infeasible to break real-world crypto? Or do they mean that breaks are feasible but still not worthwhile for the attackers? Do these people mean that it's actually infeasible to break real-world crypto? Or do they mean that breaks are feasible but still not worthwhile for the attackers? Or are they simply wrong: real-world crypto is breakable; is in fact being broken; is one of many ongoing disaster areas in security? Do these people mean that it's actually infeasible to break real-world crypto? Or do they mean that breaks are feasible but still not worthwhile for the attackers? Or are they simply wrong: real-world crypto is breakable; is in fact being broken; is one of many ongoing disaster areas in security? Let's look at some examples.
    [Show full text]
  • Key Differentiation Attacks on Stream Ciphers
    Key differentiation attacks on stream ciphers Abstract In this paper the applicability of differential cryptanalytic tool to stream ciphers is elaborated using the algebraic representation similar to early Shannon’s postulates regarding the concept of confusion. In 2007, Biham and Dunkelman [3] have formally introduced the concept of differential cryptanalysis in stream ciphers by addressing the three different scenarios of interest. Here we mainly consider the first scenario where the key difference and/or IV difference influence the internal state of the cipher (∆key, ∆IV ) → ∆S. We then show that under certain circumstances a chosen IV attack may be transformed in the key chosen attack. That is, whenever at some stage of the key/IV setup algorithm (KSA) we may identify linear relations between some subset of key and IV bits, and these key variables only appear through these linear relations, then using the differentiation of internal state variables (through chosen IV scenario of attack) we are able to eliminate the presence of corresponding key variables. The method leads to an attack whose complexity is beyond the exhaustive search, whenever the cipher admits exact algebraic description of internal state variables and the keystream computation is not complex. A successful application is especially noted in the context of stream ciphers whose keystream bits evolve relatively slow as a function of secret state bits. A modification of the attack can be applied to the TRIVIUM stream cipher [8], in this case 12 linear relations could be identified but at the same time the same 12 key variables appear in another part of state register.
    [Show full text]
  • Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond
    This may be the author’s version of a work that was submitted/accepted for publication in the following source: Henricksen, Matthew& Dawson, Edward (2006) Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond. Lecture Notes in Computer Science, 4058, Article number: AISP52-63. This file was downloaded from: https://eprints.qut.edu.au/24788/ c Consult author(s) regarding copyright matters This work is covered by copyright. Unless the document is being made available under a Creative Commons Licence, you must assume that re-use is limited to personal use and that permission from the copyright owner must be obtained for all other uses. If the docu- ment is available under a Creative Commons License (or other specified license) then refer to the Licence for details of permitted re-use. It is a condition of access that users recog- nise and abide by the legal requirements associated with these rights. If you believe that this work infringes copyright please provide details by email to [email protected] Notice: Please note that this document may not be the Version of Record (i.e. published version) of the work. Author manuscript versions (as Sub- mitted for peer review or as Accepted for publication after peer review) can be identified by an absence of publisher branding and/or typeset appear- ance. If there is any doubt, please refer to the published source. https://doi.org/10.1007/11780656_5 Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond Matt Henricksen and Ed Dawson Information Security Institute, Queensland University of Technology, GPO Box 2434, Brisbane, Queensland, 4001, Australia.
    [Show full text]
  • RC4-2S: RC4 Stream Cipher with Two State Tables
    RC4-2S: RC4 Stream Cipher with Two State Tables Maytham M. Hammood, Kenji Yoshigoe and Ali M. Sagheer Abstract One of the most important symmetric cryptographic algorithms is Rivest Cipher 4 (RC4) stream cipher which can be applied to many security applications in real time security. However, RC4 cipher shows some weaknesses including a correlation problem between the public known outputs of the internal state. We propose RC4 stream cipher with two state tables (RC4-2S) as an enhancement to RC4. RC4-2S stream cipher system solves the correlation problem between the public known outputs of the internal state using permutation between state 1 (S1) and state 2 (S2). Furthermore, key generation time of the RC4-2S is faster than that of the original RC4 due to less number of operations per a key generation required by the former. The experimental results confirm that the output streams generated by the RC4-2S are more random than that generated by RC4 while requiring less time than RC4. Moreover, RC4-2S’s high resistivity protects against many attacks vulnerable to RC4 and solves several weaknesses of RC4 such as distinguishing attack. Keywords Stream cipher Á RC4 Á Pseudo-random number generator This work is based in part, upon research supported by the National Science Foundation (under Grant Nos. CNS-0855248 and EPS-0918970). Any opinions, findings and conclusions or recommendations expressed in this material are those of the author (s) and do not necessarily reflect the views of the funding agencies or those of the employers. M. M. Hammood Applied Science, University of Arkansas at Little Rock, Little Rock, USA e-mail: [email protected] K.
    [Show full text]
  • Hardware Implementation of the Salsa20 and Phelix Stream Ciphers
    Hardware Implementation of the Salsa20 and Phelix Stream Ciphers Junjie Yan and Howard M. Heys Electrical and Computer Engineering Memorial University of Newfoundland Email: {junjie, howard}@engr.mun.ca Abstract— In this paper, we present an analysis of the digital of battery limitations and portability, while for virtual private hardware implementation of two stream ciphers proposed for the network (VPN) applications and secure e-commerce web eSTREAM project: Salsa20 and Phelix. Both high speed and servers, demand for high-speed encryption is rapidly compact designs are examined, targeted to both field increasing. programmable (FPGA) and application specific integrated circuit When considering implementation technologies, normally, (ASIC) technologies. the ASIC approach provides better performance in density and The studied designs are specified using the VHDL hardware throughput, but an FPGA is reconfigurable and more flexible. description language, and synthesized by using Synopsys CAD In our study, several schemes are used, catering to the features tools. The throughput of the compact ASIC design for Phelix is of the target technology. 260 Mbps targeted for 0.18µ CMOS technology and the corresponding area is equivalent to about 12,400 2-input NAND 2. PHELIX gates. The throughput of Salsa20 ranges from 38 Mbps for the 2.1 Short Description of the Phelix Algorithm compact FPGA design, implemented using 194 CLB slices to 4.8 Phelix is claimed to be a high-speed stream cipher. It is Gbps for the high speed ASIC design, implemented with an area selected for both software and hardware performance equivalent to about 470,000 2-input NAND gates. evaluation by the eSTREAM project.
    [Show full text]
  • Generic Attacks on Stream Ciphers
    Generic Attacks on Stream Ciphers John Mattsson Generic Attacks on Stream Ciphers 2/22 Overview What is a stream cipher? Classification of attacks Different Attacks Exhaustive Key Search Time Memory Tradeoffs Distinguishing Attacks Guess-and-Determine attacks Correlation Attacks Algebraic Attacks Sidechannel Attacks Summary Generic Attacks on Stream Ciphers 3/22 What is a stream cipher? Input: Secret key (k bits) Public IV (v bits). Output: Sequence z1, z2, … (keystream) The state (s bits) can informally be defined as the values of the set of variables that describes the current status of the cipher. For each new state, the cipher outputs some bits and then jumps to the next state where the process is repeated. The ciphertext is a function (usually XOR) of the keysteam and the plaintext. Generic Attacks on Stream Ciphers 4/22 Classification of attacks Assumed that the attacker has knowledge of the cryptographic algorithm but not the key. The aim of the attack Key recovery Prediction Distinguishing The information available to the attacker. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-chipertext Generic Attacks on Stream Ciphers 5/22 Exhaustive Key Search Can be used against any stream cipher. Given a keystream the attacker tries all different keys until the right one is found. If the key is k bits the attacker has to try 2k keys in the worst case and 2k−1 keys on average. An attack with a higher computational complexity than exhaustive key search is not considered an attack at all. Generic Attacks on Stream Ciphers 6/22 Time Memory Tradeoffs (state) Large amounts of precomputed data is used to lower the computational complexity.
    [Show full text]
  • The Rc4 Stream Encryption Algorithm
    TTHEHE RC4RC4 SSTREAMTREAM EENCRYPTIONNCRYPTION AALGORITHMLGORITHM William Stallings Stream Cipher Structure.............................................................................................................2 The RC4 Algorithm ...................................................................................................................4 Initialization of S............................................................................................................4 Stream Generation..........................................................................................................5 Strength of RC4 .............................................................................................................6 References..................................................................................................................................6 Copyright 2005 William Stallings The paper describes what is perhaps the popular symmetric stream cipher, RC4. It is used in the two security schemes defined for IEEE 802.11 wireless LANs: Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). We begin with an overview of stream cipher structure, and then examine RC4. Stream Cipher Structure A typical stream cipher encrypts plaintext one byte at a time, although a stream cipher may be designed to operate on one bit at a time or on units larger than a byte at a time. Figure 1 is a representative diagram of stream cipher structure. In this structure a key is input to a pseudorandom bit generator that produces a stream
    [Show full text]
  • Stream Cipher Designs: a Review
    SCIENCE CHINA Information Sciences March 2020, Vol. 63 131101:1–131101:25 . REVIEW . https://doi.org/10.1007/s11432-018-9929-x Stream cipher designs: a review Lin JIAO1*, Yonglin HAO1 & Dengguo FENG1,2* 1 State Key Laboratory of Cryptology, Beijing 100878, China; 2 State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China Received 13 August 2018/Accepted 30 June 2019/Published online 10 February 2020 Abstract Stream cipher is an important branch of symmetric cryptosystems, which takes obvious advan- tages in speed and scale of hardware implementation. It is suitable for using in the cases of massive data transfer or resource constraints, and has always been a hot and central research topic in cryptography. With the rapid development of network and communication technology, cipher algorithms play more and more crucial role in information security. Simultaneously, the application environment of cipher algorithms is in- creasingly complex, which challenges the existing cipher algorithms and calls for novel suitable designs. To accommodate new strict requirements and provide systematic scientific basis for future designs, this paper reviews the development history of stream ciphers, classifies and summarizes the design principles of typical stream ciphers in groups, briefly discusses the advantages and weakness of various stream ciphers in terms of security and implementation. Finally, it tries to foresee the prospective design directions of stream ciphers. Keywords stream cipher, survey, lightweight, authenticated encryption, homomorphic encryption Citation Jiao L, Hao Y L, Feng D G. Stream cipher designs: a review. Sci China Inf Sci, 2020, 63(3): 131101, https://doi.org/10.1007/s11432-018-9929-x 1 Introduction The widely applied e-commerce, e-government, along with the fast developing cloud computing, big data, have triggered high demands in both efficiency and security of information processing.
    [Show full text]
  • Analysis of Chosen Plaintext Attacks on the WAKE Stream Cipher
    Analysis of chosen plaintext attacks on the WAKE Stream Cipher Marina Pudovkina [email protected] Moscow Engineering Physics Institute (Technical University) Department of Cryptology and Discrete Mathematics Abstract. Stream ciphers are an important class of encryption algorithms, which are widely used in practice. In this paper the security of the WAKE stream cipher is investigated. We present two chosen plaintext attacks on this cipher. The complexities of these attacks can be estimated as 1019.2 and 1014.4. Keywords. WAKE. Stream Cipher. Cryptanalysis. 1 Introduction Symmetric cryptosystems can be subdivided into block and stream ciphers. Block ciphers operate with a fixed transformation on large blocks of plaintext data; stream ciphers operate with a time- varying transformation on individual plaintext digits. Typically, a stream cipher consists of a keystream generator whose pseudo-random output sequence is added modulo 2 to the plaintext bits. A major goal in stream cipher design is to efficiently produce random-looking sequences. But the keystream can be generated efficiently; there certainly exists such a simple description. WAKE is the Word Auto Key Encryption algorithm, invented by David Wheeler [1]. It has a very simple description and produces a stream of 4n-bit words, which can be XORed with a plaintext stream to produce ciphertext, or XORed with a ciphertext stream to produce plaintext. It is fast on most modern computers, and relies on repeated table use and having a large state space. WAKE works in CFB mode; the previous ciphertext word is used to generate the next key word. It is being used in the current version of Dr.
    [Show full text]
  • 6.6 Case Study: A5 Stream Cipher
    6.6 Case Study: A5 Stream Cipher A. A5/1 stream cipher key generator for secure GSM conversations Note. A GSM conversation is sent as a sequence of frames per 4.6 millisecond, and each frame contains 228 bits. @G. Gong, 2003 1 Description of the A5/1 K,64-bit key stream cipher: 64-bit key to generate a key stream where each 228- A5 bit used for one frame (228-bit) encryption. 1-bit output 228-bit buffer GSM message: … 228-bit 228-bit Output: 228-bit ciphertext, one 1 frame Bitwise addition frame of cipher @G. Gong, 2003 2 Construction of A5/1 Generator: Parameters: (a) Three LSFRs which generate m-sequences with periods 219 - 1, 222 - 1, 223 - 1, respectively. 1. LFSR 1: 19 5 2 generates a = {a(t)}. f1(x) = x + x + x + x +1 22 2. LFSR 2: f 2 ( x ) = x + x + 1 generates b = {b(t)}. 3. LFSR 3: 23 16 2 generates c = {c(t)}. f3 (x) = x + x + x + x +1 4. Tap positions: d1 = 11, d2 = 12 and d3 = 13. @G. Gong, 2003 3 (b) Majority function f(x1, x2, x3) = (y1, y2, y3) is defined by f (a(t +11),b(t +12),c(t +13)) a(t +11) b(t +12) c(t +13) = (y1, y2, y3) (1,1,1) 0 0 0 1 1 1 (1,1,0) 0 0 1 1 1 0 (0,1,1) 0 1 1 1 0 0 (1,0,1) 1 0 1 0 1 0 Output: The output sequence u = {u(t)} which performs at time t, u(t) = a(i1) + b(i2) + c(i3), t = 0, 1, ..
    [Show full text]
  • Iris Um Oifig Maoine Intleachtúla Na Héireann Journal of the Intellectual Property Office of Ireland
    Iris um Oifig Maoine Intleachtúla na hÉireann Journal of the Intellectual Property Office of Ireland Iml. 96 Cill Chainnigh 04 August 2021 Uimh. 2443 CLÁR INNSTE Cuid I Cuid II Paitinní Trádmharcanna Leath Leath Official Notice 2355 Official Notice 1659 Applications for Patents 2354 Applications for Trade Marks 1660 Applications Published 2354 Oppositions under Section 43 1717 Patents Granted 2355 Application(s) Amended 1717 European Patents Granted 2356 Application(s) Withdrawn 1719 Applications Withdrawn, Deemed Withdrawn or Trade Marks Registered 1719 Refused 2567 Trade Marks Renewed 1721 Patents Lapsed 2567 International Registrations under the Madrid Request for Grant of Supplementary Protection Protocol 1724 Certificate 2568 International Trade Marks Protected 1735 Supplementary Protection Certificate Granted 2568 Cancellations effected for the following Patents Expired 2570 goods/services under the Madrid protocol 1736 Dearachtaí Designs Information under the 2001 Act Designs Registered 2578 Designs Renewed 2582 The Journal of the Intellectual Property Office of Ireland is published fortnightly. Each issue is freely available to view or download from our website at www.ipoi.gov.ie © Rialtas na hÉireann, 2021 © Government of Ireland, 2021 2353 (04/08/2021) Journal of the Intellectual Property Office of Ireland (No. 2443) Iris um Oifig Maoine Intleachtúla na hÉireann Journal of the Intellectual Property Office of Ireland Cuid I Paitinní agus Dearachtaí No. 2443 Wednesday, 4 August, 2021 NOTE: The office does not guarantee the accuracy of its publications nor undertake any responsibility for errors or omissions or their consequences. In this Part of the Journal, a reference to a section is to a section of the Patents Act, 1992 unless otherwise stated.
    [Show full text]
  • "Analysis and Implementation of RC4 Stream Cipher"
    Analysis and Implementation of RC4 Stream Cipher A thesis presented to Indian Statistical Institute in fulfillment of the thesis requirement for the degree of Doctor of Philosophy in Computer Science by Sourav Sen Gupta under the supervision of Professor Subhamoy Maitra Applied Statistics Unit INDIAN STATISTICAL INSTITUTE Kolkata, West Bengal, India, 2013 To the virtually endless periods of sweet procrastination that kept me sane during the strenuous one-night stands with my thesis. i ii Abstract RC4 has been the most popular stream cipher in the history of symmetric key cryptography. Designed in 1987 by Ron Rivest, RC4 is the most widely deployed commercial stream cipher, having applications in network protocols such as SSL, WEP, WPA and in Microsoft Windows, Apple OCE, Secure SQL, etc. The enigmatic appeal of the cipher has roots in its simple design, which is undoubtedly the simplest for any practical cryptographic algorithm to date. In this thesis, we focus on the analysis and implementation of RC4. For the first time in RC4 literature, we report significant keystream bi- ases depending on the length of RC4 secret key. In the process, we prove two empirical biases that were experimentally reported and used in recent attacks against WEP and WPA by Sepehrdad, Vaudenay and Vuagnoux in EUROCRYPT 2011. In addition to this, we present a conclusive proof for the extended keylength dependent biases in RC4, a follow-up problem to our keylength dependent results, identified and partially solved by Isobe, Ohigashi, Watanabe and Morii in FSE 2013. In a recent result by AlFardan, Bernstein, Paterson, Poettering and Schuldt, to appear in USENIX Security Symposium 2013, the authors ob- served a bias of the first output byte towards 129.
    [Show full text]