Stream Ciphers – an Overview

Total Page:16

File Type:pdf, Size:1020Kb

Stream Ciphers – an Overview Stream Ciphers – An Overview Palash Sarkar Indian Statistical Institute, Kolkata email: [email protected] stream cipher overview, Palash Sarkar – p.1/51 Classical Encryption Adversary message ciphertext ciphertext message Encrypt Decrypt public channel secret key K secret key K Adversary’s goal: To obtain message or secret key. stream cipher overview, Palash Sarkar – p.2/51 One Time Pad Let the message be a sequence of bits: ¡£¢¥¤ ¡£¦ ¡©¨ ¤ § § ¤ § ¨ ¢ ¤ Let § § ¤ § be a sequence of random bits. ¨ ¢ ¤ ¦ Ciphertext is ¤ § § ¤ § £ ¡ where . Perfect Secrecy: Given a ciphertext, the message can be any binary string of length . Impractical: (a) Difficult to get random bits. (b) Sequence must be pre-distributed to both sender and receiver. (c) random sequence as long as the message. stream cipher overview, Palash Sarkar – p.3/51 Additive Stream Ciphers Use a pseudorandom generator PRG to produce ¨ ¢¥¤ the sequence § § ¤ § . The PRG extends a short “seed” into a long “pseudorandom” string, i.e., ¡ ¨ ¢¥¤ PRG § § ¤ § . The seed is the secret key . Security depends on the design of PRG. stream cipher overview, Palash Sarkar – p.4/51 Security of PRG PRG is a broad concept. For cryptographic use, a PRG must be unpredictable: Next bit test: Given an initial segment, it should not be possible to efficiently guess the next bit. Statistical Tests: The generated pseudorandom sequence should pass all polynomial time statistical tests. The above notions are equivalent. stream cipher overview, Palash Sarkar – p.5/51 p.6/51 – Sarkar alash P , w ervie v § o (PRP). ¤ ¥ a cipher £ . is stream ¢ ¡ ¤ ¡ © . ¡ cipher § , § © ¤ ¤ permutation £ £ block ¢ . ¢ ¤ ¤ ¡ ¥ ¤ ¡ as £ ¦ -bit ¨ . ¢ y ¤ e ¡ ¤ ¥ k an £ of written ¢ ed ¤ ¡ is Pseudorandom ¡ fix secret called is the ¡ each ¤ Ciphers © is or F Security: permutation Let Block Stream and Block Ciphers Block Ciphers: Applies a fixed permutation to all -bit blocks. Stream Ciphers: Applies a time-varying map. Maintains a state vector, which allows the application of a time-varying map. This difference is not very important. Some block cipher modes of operations are actually stream ciphers. Modern day stream ciphers are becoming more and more block oriented. The difference between PRP and PRG is more fundamental. stream cipher overview, Palash Sarkar – p.7/51 Attacks General Attack Models Known (or chosen) plaintext attack: The adversary learns a segment of the pseudorandom sequence. Chosen ciphertext attack: Adversary submits ciphertexts and gets back the corresponding plaintexts. Attack Goals Distinguishing Attacks: The adversary should be able to distinguish the output of the PRG from a random string. Key Recovery Attacks: The adversary has to find the “seed” of the PRG from the output of the PRG. stream cipher overview, Palash Sarkar – p.8/51 Based on Hard Problems Blum, Blum and Shub (BBS): ¦ § £ ¢ ¥ ¡ ¡ ¤ Let , where ¤ . ¦ ¥ ¨ ¨ ¨ ¤ ¢ ¦ © Seed: . Iterates . ¡ ¨ Bit extraction: parity . Security: If determining quadratic residuacity modulo is difficult, then guessing is also difficult. Efficiency: Slow; one squaring per bit. Recent criticism: Menezes and Koblitz have argued that security guarantee is not realistic. Elliptic curve based construction also known. stream cipher overview, Palash Sarkar – p.9/51 Classical Models Hardware based – well studied – based on old ideas (almost four decades). Uses Linear Feedback Shift Registers (LFSR) and Boolean Functions. LFSR: Fast generation of bit sequences (satisfying a linear recurrence) in hardware. Boolean function: Maps an -bit string to one bit. ¡ S-box: Maps an -bit string to an -bit string. stream cipher overview, Palash Sarkar – p.10/51 p.11/51 – Sarkar the . alash P ¢ , w LFSR. has ervie ¡ ¢ ¦ v o ¨ an polynomial ¢ cipher . ¦ £ sequence. © stream then ¥ ¥ using , ¥ ¡ ¨ ¥ ¥ sequence. § ¥ ¨§ are bit of ¦ ¤ a recurring ¦ ¤ ¨ characteristic ¨ ¨ be © er ¡£¢ hardw § v § ¦ ¤ the period ¦ ¤ o § in linear ¨ e ¨ a ¤ ¡ v called ¤ ¡ ¦ ¨ ¨ ¨ is possible © ¡£¢ called ¡ ¢ ¤ ¡ primiti ¨ produced ¡ is is ¨ ¡ be ¨ . ¦ can maximum of Let Suppose Then Let Then If LFSR Two Standard Models Nonlinear Filter Model: Boolean function combines outputs of different cells of a single LFSR. Nonlinear Combiner Model: Boolean function combines outputs of several LFSRs. Filter-Combiner model (Sarkar, Crypto 2002) combines the best features of the above two models. Uses linear cellular automata (CA) instead of LFSRs. Suitable Boolean functions are required to realize FC-model. stream cipher overview, Palash Sarkar – p.12/51 Filter-Combiner Model CA 1 mi CA 2 ri ci f CA k stream cipher overview, Palash Sarkar – p.13/51 Necessary Properties High linear complexity of the output sequence. Suitable choice of the Boolean function. Balanced. Correlation immune. High algebraic degree. High nonlinearlity. Resistance to algebraic attacks. stream cipher overview, Palash Sarkar – p.14/51 Linear Complexity ¡ ¡ ¢¥¤ ¢ Let § § ¤ § be a sequence (possibly used to encrypt a message). The linear complexity of is the length of a minimum length LFSR that can produce . Berlekamp-Massey algorithm can be used to find the linear complexity and a minimal length LFSR producing . £¢ ¡ The time complexity of the algorithm is . The BM algorithm was originally introduced for decoding BCH codes. If is a random sequence, then its expected ¤¨§ linear complexity is ¡ . stream cipher overview, Palash Sarkar – p.15/51 Linear Complexity (contd.) Nonlinear-Filter Model: Partial results are known – due to Rueppel. Depends on the choice of the Boolean function. For certain Boolean functions, the linear complexity can be large. Nonlinear-Combiner Model: ¡ ¨ ¨ ¦ ¤ ¥ Let § § ¤ § be the combining Boolean function. ¦ ¤ ¥ Let § § ¤ § be the lengths of the LFSRs which are taken to be distinct. ¡ ¦ ¤ ¥ Then the linear complexity is § § ¤ § where the arithmetic is over the integers (Rueppel-Staffelbach). stream cipher overview, Palash Sarkar – p.16/51 Upper bound on linear complexity is . p.17/51 – Sarkar from alash P , respect w ervie v o cipher with Boolean . stream obtained ¦ the biased . model. ¡ of is ¢ ¨ ¡ ¢ sequence ¡ § ¤ § . § ¤ © ¨ § § output § the ¡ ¤ ¡ ¢¥¤ ¦ ¨ the -combiner be . ¡ ¡ © ¨ be ¢ ¨ § genthaler Attack ¡ ¢ ¦ § ¤ £¥¤ Sie § § ¤ output § § nonlinear § ¡ LFSR by ¤ sequence the ¦ ¨ ¡ ¢¥¤ th ¢ the the elation the to Let Let Suppose Then function. Introduced Assume Corr Correlation Attack (contd.) ¡ ¡ ¢¥¤ ¢ Assume that the sequence § § ¤ § is known. (Also possible to work with the ciphertext.) ¢¡ § £ For each of the © nonzero initial states of ¡ ¡ ¨ ¨ ¦ ¢ , generate the sequence ¤ § § ¤ § . ¡ ¨ £ £ § ¡ ¦ ¤ ¨ © Compute © for each such sequence. If the choice of initial condition is correct, then ¤¨§ £ £ £ ¤ ¤ else, . ¤¨§ £ ¢ If and are “sufficiently” separate and is “sufficiently” large, then we can find the correct initial state for . stream cipher overview, Palash Sarkar – p.18/51 Correlation Attack (contd.) ¤¨§ £ If , then this does not work for . ¤¨§ ¡ £ ¢ If for all , then is said to be correlation immune (CI). One can then look for correlation between and XORs of several ’s. ¡ ¡ If is th order CI, then this method will not succeed if we take the XORs of upto ¡ LFSRs. ¡ ¡ A balanced -CI function is called -resilient. stream cipher overview, Palash Sarkar – p.19/51 Correlation Attack (contd.) Fast Correlation Attack: Avoid considering all possible initial states (Meier-Staffelbach). Each LFSR sequence satisfies a linear recurrence. ¡ Let ¨ be the characteristic polynomial of the recurrence. Then the sequence also satisfies a recurrence ¡ given by any multiple of ¨ . Collection of all such recurrences (with “low span”) constitute a set of parity check equations. An iterative decoding method can be applied to obtain the original sequence from these parity check equations. stream cipher overview, Palash Sarkar – p.20/51 Multiples of Polynomials ¡ Multiples of ¨ provide parity check equations. It is helpful for the attack if these parity check equations have few terms. ¡ For example, if ¨ has a trinomial multiple, then the obtained parity check has three terms. ¡ A “good” polynomial ¨ will not have low degree sparse multiples. Determining whether a polynomial is “good” can be difficult. Work by Wagner (Crypto 2002) based on the generalized birthday attack. stream cipher overview, Palash Sarkar – p.21/51 Algebraic Attack Courtois-Meier: Consider the nonlinear-filter model, i.e., there is a single LFSR . Let ¢ be the initial state of the LFSR. ¡ ¢ The th state is obtained as ¢ . ¡ Let be the combining Boolean function of degree ¡ . The key bits of can be written as ¡ ¡ ¡ ¢ § ¡ ¢ For any , the map is a linear map. ¢ Thus, for any , we obtain a nonlinear equation in ¡ the bits of ¢ of maximum degree . stream cipher overview, Palash Sarkar – p.22/51 Algebraic Attack (contd.) Linearization: Replace each monomial of degree greater than one by a new variable. £ ¢ ¥ ¢ Let ¡ . We obtain a system of linear equations in at most variables. If there are “independent” equations, then we can solve for these variables and use back substitution to obtain the bits of ¢ . ¤ ¡ Time required is . Becomes infeasible if is large, which can be ensured by having ¡ to be large. stream cipher overview, Palash Sarkar – p.23/51 Algebraic Attack (contd.) ¡ Suppose has large degree , but there are low ¡ ¡ ¡ degree polynomials ¨ and ¨ such that ¡ ¡ ¡ ¡ ¨ ¨ ¨ . Then a modification of the above idea can be ¡ ¡ applied to ¡ instead of . ¡ ¡ ¡ If ¨ is zero, then ¨ is called an annihilator. A low degree annihilator can be used for the attack. ¡
Recommended publications
  • Failures of Secret-Key Cryptography D
    Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago & Technische Universiteit Eindhoven http://xkcd.com/538/ 2011 Grigg{Gutmann: In the past 15 years \no one ever lost money to an attack on a properly designed cryptosystem (meaning one that didn't use homebrew crypto or toy keys) in the Internet or commercial worlds". 2011 Grigg{Gutmann: In the past 15 years \no one ever lost money to an attack on a properly designed cryptosystem (meaning one that didn't use homebrew crypto or toy keys) in the Internet or commercial worlds". 2002 Shamir:\Cryptography is usually bypassed. I am not aware of any major world-class security system employing cryptography in which the hackers penetrated the system by actually going through the cryptanalysis." Do these people mean that it's actually infeasible to break real-world crypto? Do these people mean that it's actually infeasible to break real-world crypto? Or do they mean that breaks are feasible but still not worthwhile for the attackers? Do these people mean that it's actually infeasible to break real-world crypto? Or do they mean that breaks are feasible but still not worthwhile for the attackers? Or are they simply wrong: real-world crypto is breakable; is in fact being broken; is one of many ongoing disaster areas in security? Do these people mean that it's actually infeasible to break real-world crypto? Or do they mean that breaks are feasible but still not worthwhile for the attackers? Or are they simply wrong: real-world crypto is breakable; is in fact being broken; is one of many ongoing disaster areas in security? Let's look at some examples.
    [Show full text]
  • A Uniform Framework for Cryptanalysis of the Bluetooth E0
    1 A Uniform Framework for Cryptanalysis of the Bluetooth E0 Cipher Ophir Levy and Avishai Wool School of Electrical Engineering, Tel Aviv University, Ramat Aviv 69978, ISRAEL. [email protected], [email protected] . Abstract— In this paper we analyze the E0 cipher, which “short key” attacks, that need at most 240 known is the encryption system used in the Bluetooth specification. keystream bits and are applicable in the Bluetooth We suggest a uniform framework for cryptanalysis of the setting; and “long key” attacks, that are applicable only E0 cipher. Our method requires 128 known bits of the if the E0 cipher is used outside the Bluetooth mode of keystream in order to recover the initial state of the LFSRs, operation. which reflects the secret key of this encryption engine. In one setting, our framework reduces to an attack of 1) Short Key Attacks: D. Bleichenbacher has shown D. Bleichenbacher. In another setting, our framework is in [1] that an attacker can guess the content of the equivalent to an attack presented by Fluhrer and Lucks. registers of the three smaller LFSRs and of the E0 − Our best attack can recover the initial state of the LFSRs combiner state registers with a probability of 2 93. Then after solving 286 boolean linear systems of equations, which the attacker can compute the the contents of the largest is roughly equivalent to the results obtained by Fluhrer and LFSR (of length 39 bit) by “reverse engineering” it Lucks. from the outputs of the other LFSRs and the combiner states. This attack requires a total of 128 bits of known I.
    [Show full text]
  • Key Differentiation Attacks on Stream Ciphers
    Key differentiation attacks on stream ciphers Abstract In this paper the applicability of differential cryptanalytic tool to stream ciphers is elaborated using the algebraic representation similar to early Shannon’s postulates regarding the concept of confusion. In 2007, Biham and Dunkelman [3] have formally introduced the concept of differential cryptanalysis in stream ciphers by addressing the three different scenarios of interest. Here we mainly consider the first scenario where the key difference and/or IV difference influence the internal state of the cipher (∆key, ∆IV ) → ∆S. We then show that under certain circumstances a chosen IV attack may be transformed in the key chosen attack. That is, whenever at some stage of the key/IV setup algorithm (KSA) we may identify linear relations between some subset of key and IV bits, and these key variables only appear through these linear relations, then using the differentiation of internal state variables (through chosen IV scenario of attack) we are able to eliminate the presence of corresponding key variables. The method leads to an attack whose complexity is beyond the exhaustive search, whenever the cipher admits exact algebraic description of internal state variables and the keystream computation is not complex. A successful application is especially noted in the context of stream ciphers whose keystream bits evolve relatively slow as a function of secret state bits. A modification of the attack can be applied to the TRIVIUM stream cipher [8], in this case 12 linear relations could be identified but at the same time the same 12 key variables appear in another part of state register.
    [Show full text]
  • Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond
    This may be the author’s version of a work that was submitted/accepted for publication in the following source: Henricksen, Matthew& Dawson, Edward (2006) Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond. Lecture Notes in Computer Science, 4058, Article number: AISP52-63. This file was downloaded from: https://eprints.qut.edu.au/24788/ c Consult author(s) regarding copyright matters This work is covered by copyright. Unless the document is being made available under a Creative Commons Licence, you must assume that re-use is limited to personal use and that permission from the copyright owner must be obtained for all other uses. If the docu- ment is available under a Creative Commons License (or other specified license) then refer to the Licence for details of permitted re-use. It is a condition of access that users recog- nise and abide by the legal requirements associated with these rights. If you believe that this work infringes copyright please provide details by email to [email protected] Notice: Please note that this document may not be the Version of Record (i.e. published version) of the work. Author manuscript versions (as Sub- mitted for peer review or as Accepted for publication after peer review) can be identified by an absence of publisher branding and/or typeset appear- ance. If there is any doubt, please refer to the published source. https://doi.org/10.1007/11780656_5 Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond Matt Henricksen and Ed Dawson Information Security Institute, Queensland University of Technology, GPO Box 2434, Brisbane, Queensland, 4001, Australia.
    [Show full text]
  • Cs 255 (Introduction to Cryptography)
    CS 255 (INTRODUCTION TO CRYPTOGRAPHY) DAVID WU Abstract. Notes taken in Professor Boneh’s Introduction to Cryptography course (CS 255) in Winter, 2012. There may be errors! Be warned! Contents 1. 1/11: Introduction and Stream Ciphers 2 1.1. Introduction 2 1.2. History of Cryptography 3 1.3. Stream Ciphers 4 1.4. Pseudorandom Generators (PRGs) 5 1.5. Attacks on Stream Ciphers and OTP 6 1.6. Stream Ciphers in Practice 6 2. 1/18: PRGs and Semantic Security 7 2.1. Secure PRGs 7 2.2. Semantic Security 8 2.3. Generating Random Bits in Practice 9 2.4. Block Ciphers 9 3. 1/23: Block Ciphers 9 3.1. Pseudorandom Functions (PRF) 9 3.2. Data Encryption Standard (DES) 10 3.3. Advanced Encryption Standard (AES) 12 3.4. Exhaustive Search Attacks 12 3.5. More Attacks on Block Ciphers 13 3.6. Block Cipher Modes of Operation 13 4. 1/25: Message Integrity 15 4.1. Message Integrity 15 5. 1/27: Proofs in Cryptography 17 5.1. Time/Space Tradeoff 17 5.2. Proofs in Cryptography 17 6. 1/30: MAC Functions 18 6.1. Message Integrity 18 6.2. MAC Padding 18 6.3. Parallel MAC (PMAC) 19 6.4. One-time MAC 20 6.5. Collision Resistance 21 7. 2/1: Collision Resistance 21 7.1. Collision Resistant Hash Functions 21 7.2. Construction of Collision Resistant Hash Functions 22 7.3. Provably Secure Compression Functions 23 8. 2/6: HMAC And Timing Attacks 23 8.1. HMAC 23 8.2.
    [Show full text]
  • RC4-2S: RC4 Stream Cipher with Two State Tables
    RC4-2S: RC4 Stream Cipher with Two State Tables Maytham M. Hammood, Kenji Yoshigoe and Ali M. Sagheer Abstract One of the most important symmetric cryptographic algorithms is Rivest Cipher 4 (RC4) stream cipher which can be applied to many security applications in real time security. However, RC4 cipher shows some weaknesses including a correlation problem between the public known outputs of the internal state. We propose RC4 stream cipher with two state tables (RC4-2S) as an enhancement to RC4. RC4-2S stream cipher system solves the correlation problem between the public known outputs of the internal state using permutation between state 1 (S1) and state 2 (S2). Furthermore, key generation time of the RC4-2S is faster than that of the original RC4 due to less number of operations per a key generation required by the former. The experimental results confirm that the output streams generated by the RC4-2S are more random than that generated by RC4 while requiring less time than RC4. Moreover, RC4-2S’s high resistivity protects against many attacks vulnerable to RC4 and solves several weaknesses of RC4 such as distinguishing attack. Keywords Stream cipher Á RC4 Á Pseudo-random number generator This work is based in part, upon research supported by the National Science Foundation (under Grant Nos. CNS-0855248 and EPS-0918970). Any opinions, findings and conclusions or recommendations expressed in this material are those of the author (s) and do not necessarily reflect the views of the funding agencies or those of the employers. M. M. Hammood Applied Science, University of Arkansas at Little Rock, Little Rock, USA e-mail: [email protected] K.
    [Show full text]
  • (Not) to Design and Implement Post-Quantum Cryptography
    SoK: How (not) to Design and Implement Post-Quantum Cryptography James Howe1 , Thomas Prest1 , and Daniel Apon2 1 PQShield, Oxford, UK. {james.howe,thomas.prest}@pqshield.com 2 National Institute of Standards and Technology, USA. [email protected] Abstract Post-quantum cryptography has known a Cambrian explo- sion in the last decade. What started as a very theoretical and mathe- matical area has now evolved into a sprawling research ˝eld, complete with side-channel resistant embedded implementations, large scale de- ployment tests and standardization e˙orts. This study systematizes the current state of knowledge on post-quantum cryptography. Compared to existing studies, we adopt a transversal point of view and center our study around three areas: (i) paradigms, (ii) implementation, (iii) deployment. Our point of view allows to cast almost all classical and post-quantum schemes into just a few paradigms. We highlight trends, common methodologies, and pitfalls to look for and recurrent challenges. 1 Introduction Since Shor's discovery of polynomial-time quantum algorithms for the factoring and discrete logarithm problems, researchers have looked at ways to manage the potential advent of large-scale quantum computers, a prospect which has become much more tangible of late. The proposed solutions are cryptographic schemes based on problems assumed to be resistant to quantum computers, such as those related to lattices or hash functions. Post-quantum cryptography (PQC) is an umbrella term that encompasses the design, implementation, and integration of these schemes. This document is a Systematization of Knowledge (SoK) on this diverse and progressive topic. We have made two editorial choices.
    [Show full text]
  • Hardware Implementation of the Salsa20 and Phelix Stream Ciphers
    Hardware Implementation of the Salsa20 and Phelix Stream Ciphers Junjie Yan and Howard M. Heys Electrical and Computer Engineering Memorial University of Newfoundland Email: {junjie, howard}@engr.mun.ca Abstract— In this paper, we present an analysis of the digital of battery limitations and portability, while for virtual private hardware implementation of two stream ciphers proposed for the network (VPN) applications and secure e-commerce web eSTREAM project: Salsa20 and Phelix. Both high speed and servers, demand for high-speed encryption is rapidly compact designs are examined, targeted to both field increasing. programmable (FPGA) and application specific integrated circuit When considering implementation technologies, normally, (ASIC) technologies. the ASIC approach provides better performance in density and The studied designs are specified using the VHDL hardware throughput, but an FPGA is reconfigurable and more flexible. description language, and synthesized by using Synopsys CAD In our study, several schemes are used, catering to the features tools. The throughput of the compact ASIC design for Phelix is of the target technology. 260 Mbps targeted for 0.18µ CMOS technology and the corresponding area is equivalent to about 12,400 2-input NAND 2. PHELIX gates. The throughput of Salsa20 ranges from 38 Mbps for the 2.1 Short Description of the Phelix Algorithm compact FPGA design, implemented using 194 CLB slices to 4.8 Phelix is claimed to be a high-speed stream cipher. It is Gbps for the high speed ASIC design, implemented with an area selected for both software and hardware performance equivalent to about 470,000 2-input NAND gates. evaluation by the eSTREAM project.
    [Show full text]
  • Weak Keys for AEZ, and the External Key Padding Attack
    Weak Keys for AEZ, and the External Key Padding Attack Bart Mennink1;2 1 Dept. Electrical Engineering, ESAT/COSIC, KU Leuven, and iMinds, Belgium [email protected] 2 Digital Security Group, Radboud University, Nijmegen, The Netherlands [email protected] Abstract. AEZ is one of the third round candidates in the CAESAR competition. We observe that the tweakable blockcipher used in AEZ suffers from structural design issues in case one of the three 128-bit sub- keys is zero. Calling these keys \weak," we show that a distinguishing attack on AEZ with weak key can be performed in at most five queries. Although the fraction of weak keys, around 3 out of every 2128, seems to be too small to violate the security claims of AEZ in general, they do reveal unexpected behavior of the scheme in certain use cases. We derive a potential scenario, the \external key padding," where a user of the authenticated encryption scheme pads the key externally before it is fed to the scheme. While for most authenticated encryption schemes this would affect the security only marginally, AEZ turns out to be com- pletely insecure in this scenario due to its weak keys. These observations open a discussion on the significance of the \robustness" stamp, and on what it encompasses. Keywords. AEZ, tweakable blockcipher, weak keys, attack, external key padding, robustness. 1 Introduction Authenticated encryption aims to offer both privacy and authenticity of data. The ongoing CAESAR competition [8] targets the development of a portfolio of new, solid, authenticated encryption schemes. It received 57 submissions, 30 candidates advanced to the second round, and recently, 16 of those advanced to the third round.
    [Show full text]
  • Generic Attacks on Stream Ciphers
    Generic Attacks on Stream Ciphers John Mattsson Generic Attacks on Stream Ciphers 2/22 Overview What is a stream cipher? Classification of attacks Different Attacks Exhaustive Key Search Time Memory Tradeoffs Distinguishing Attacks Guess-and-Determine attacks Correlation Attacks Algebraic Attacks Sidechannel Attacks Summary Generic Attacks on Stream Ciphers 3/22 What is a stream cipher? Input: Secret key (k bits) Public IV (v bits). Output: Sequence z1, z2, … (keystream) The state (s bits) can informally be defined as the values of the set of variables that describes the current status of the cipher. For each new state, the cipher outputs some bits and then jumps to the next state where the process is repeated. The ciphertext is a function (usually XOR) of the keysteam and the plaintext. Generic Attacks on Stream Ciphers 4/22 Classification of attacks Assumed that the attacker has knowledge of the cryptographic algorithm but not the key. The aim of the attack Key recovery Prediction Distinguishing The information available to the attacker. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-chipertext Generic Attacks on Stream Ciphers 5/22 Exhaustive Key Search Can be used against any stream cipher. Given a keystream the attacker tries all different keys until the right one is found. If the key is k bits the attacker has to try 2k keys in the worst case and 2k−1 keys on average. An attack with a higher computational complexity than exhaustive key search is not considered an attack at all. Generic Attacks on Stream Ciphers 6/22 Time Memory Tradeoffs (state) Large amounts of precomputed data is used to lower the computational complexity.
    [Show full text]
  • The Rc4 Stream Encryption Algorithm
    TTHEHE RC4RC4 SSTREAMTREAM EENCRYPTIONNCRYPTION AALGORITHMLGORITHM William Stallings Stream Cipher Structure.............................................................................................................2 The RC4 Algorithm ...................................................................................................................4 Initialization of S............................................................................................................4 Stream Generation..........................................................................................................5 Strength of RC4 .............................................................................................................6 References..................................................................................................................................6 Copyright 2005 William Stallings The paper describes what is perhaps the popular symmetric stream cipher, RC4. It is used in the two security schemes defined for IEEE 802.11 wireless LANs: Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). We begin with an overview of stream cipher structure, and then examine RC4. Stream Cipher Structure A typical stream cipher encrypts plaintext one byte at a time, although a stream cipher may be designed to operate on one bit at a time or on units larger than a byte at a time. Figure 1 is a representative diagram of stream cipher structure. In this structure a key is input to a pseudorandom bit generator that produces a stream
    [Show full text]
  • Stream Cipher Designs: a Review
    SCIENCE CHINA Information Sciences March 2020, Vol. 63 131101:1–131101:25 . REVIEW . https://doi.org/10.1007/s11432-018-9929-x Stream cipher designs: a review Lin JIAO1*, Yonglin HAO1 & Dengguo FENG1,2* 1 State Key Laboratory of Cryptology, Beijing 100878, China; 2 State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China Received 13 August 2018/Accepted 30 June 2019/Published online 10 February 2020 Abstract Stream cipher is an important branch of symmetric cryptosystems, which takes obvious advan- tages in speed and scale of hardware implementation. It is suitable for using in the cases of massive data transfer or resource constraints, and has always been a hot and central research topic in cryptography. With the rapid development of network and communication technology, cipher algorithms play more and more crucial role in information security. Simultaneously, the application environment of cipher algorithms is in- creasingly complex, which challenges the existing cipher algorithms and calls for novel suitable designs. To accommodate new strict requirements and provide systematic scientific basis for future designs, this paper reviews the development history of stream ciphers, classifies and summarizes the design principles of typical stream ciphers in groups, briefly discusses the advantages and weakness of various stream ciphers in terms of security and implementation. Finally, it tries to foresee the prospective design directions of stream ciphers. Keywords stream cipher, survey, lightweight, authenticated encryption, homomorphic encryption Citation Jiao L, Hao Y L, Feng D G. Stream cipher designs: a review. Sci China Inf Sci, 2020, 63(3): 131101, https://doi.org/10.1007/s11432-018-9929-x 1 Introduction The widely applied e-commerce, e-government, along with the fast developing cloud computing, big data, have triggered high demands in both efficiency and security of information processing.
    [Show full text]