Comparison of 256-Bit Stream Ciphers DJ Bernstein Thanks To

Total Page:16

File Type:pdf, Size:1020Kb

Comparison of 256-Bit Stream Ciphers DJ Bernstein Thanks To Comparison of Cipher implementations 256-bit stream ciphers from cipher authors D. J. Bernstein Timing tools Thanks to: (De Canni`ere) University of Illinois at Chicago Denmark Technical University Timings Alfred P. Sloan Foundation on various machines Graphing tools (Bernstein) Speed graphs in this talk Comparison of Cipher implementations Security disasters 256-bit stream ciphers from cipher authors Attack claimed on YAMB: “258.” D. J. Bernstein 72 Timing tools Attack claimed on Py: “2 .” Thanks to: (De Canni`ere) Presumably also Py6. University of Illinois at Chicago Attack claimed on SOSEMANUK: Denmark Technical University Timings “2226.” Alfred P. Sloan Foundation on various machines Is there any dispute Graphing tools about these attacks? (Bernstein) If not: Reject YAMB etc. as competition for 256-bit AES. Speed graphs in this talk Cipher implementations Security disasters from cipher authors Attack claimed on YAMB: “258.” 72 Timing tools Attack claimed on Py: “2 .” (De Canni`ere) Presumably also Py6. Attack claimed on SOSEMANUK: Timings “2226.” on various machines Is there any dispute Graphing tools about these attacks? (Bernstein) If not: Reject YAMB etc. as competition for 256-bit AES. Speed graphs in this talk Cipher implementations Security disasters Speed disasters from cipher authors Attack claimed on YAMB: “258.” FUBUKI is slower than AES 72 in all of these benchmarks. Timing tools Attack claimed on Py: “2 .” Any hope of faster FUBUKI? (De Canni`ere) Presumably also Py6. If not: Reject FUBUKI. Attack claimed on SOSEMANUK: VEST is extremely slow Timings “2226.” on various machines in all of these benchmarks. Is there any dispute On the other hand, Graphing tools about these attacks? VEST is claimed to be (Bernstein) If not: Reject YAMB etc. as faster in hardware. competition for 256-bit AES. Speed graphs in this talk Security disasters Speed disasters Attack claimed on YAMB: “258.” FUBUKI is slower than AES in all of these benchmarks. Attack claimed on Py: “272.” Any hope of faster FUBUKI? Presumably also Py6. If not: Reject FUBUKI. Attack claimed on SOSEMANUK: VEST is extremely slow “2226.” in all of these benchmarks. Is there any dispute On the other hand, about these attacks? VEST is claimed to be If not: Reject YAMB etc. as faster in hardware. competition for 256-bit AES. Security disasters Speed disasters Remaining 256-bit ciphers: CryptMT, DICING, Dragon, Attack claimed on YAMB: “258.” FUBUKI is slower than AES HC-256, Phelix, Salsa20. in all of these benchmarks. Attack claimed on Py: “272.” Any hope of faster FUBUKI? Could say, e.g., Presumably also Py6. If not: Reject FUBUKI. “CryptMT is practically always Attack claimed on SOSEMANUK: slower than Phelix 226 VEST is extremely slow “2 .” and should be eliminated”; in all of these benchmarks. but what if Phelix is broken? Is there any dispute On the other hand, about these attacks? VEST is claimed to be Attacks on Py, SOSEMANUK If not: Reject YAMB etc. as faster in hardware. were published in December. competition for 256-bit AES. Need more time for cryptanalysis. Speed disasters Remaining 256-bit ciphers: CryptMT, DICING, Dragon, FUBUKI is slower than AES HC-256, Phelix, Salsa20. in all of these benchmarks. Any hope of faster FUBUKI? Could say, e.g., If not: Reject FUBUKI. “CryptMT is practically always slower than Phelix VEST is extremely slow and should be eliminated”; in all of these benchmarks. but what if Phelix is broken? On the other hand, VEST is claimed to be Attacks on Py, SOSEMANUK faster in hardware. were published in December. Need more time for cryptanalysis. Speed disasters Remaining 256-bit ciphers: Speedup: security margin CryptMT, DICING, Dragon, FUBUKI is slower than AES Can speed up AES HC-256, Phelix, Salsa20. in all of these benchmarks. by reducing rounds Any hope of faster FUBUKI? Could say, e.g., from 14 to, e.g., 10. If not: Reject FUBUKI. “CryptMT is practically always No known attacks. slower than Phelix VEST is extremely slow Can speed up Salsa20 and should be eliminated”; in all of these benchmarks. by reducing rounds but what if Phelix is broken? On the other hand, from 20 to, e.g., 12 or 8. VEST is claimed to be Attacks on Py, SOSEMANUK No known attacks. faster in hardware. were published in December. Do any other submissions Need more time for cryptanalysis. have a security margin? Remaining 256-bit ciphers: Speedup: security margin CryptMT, DICING, Dragon, Can speed up AES HC-256, Phelix, Salsa20. by reducing rounds Could say, e.g., from 14 to, e.g., 10. “CryptMT is practically always No known attacks. slower than Phelix Can speed up Salsa20 and should be eliminated”; by reducing rounds but what if Phelix is broken? from 20 to, e.g., 12 or 8. Attacks on Py, SOSEMANUK No known attacks. were published in December. Do any other submissions Need more time for cryptanalysis. have a security margin? Remaining 256-bit ciphers: Speedup: security margin Slowdown: forgeries CryptMT, DICING, Dragon, Can speed up AES Packets must be authenticated. HC-256, Phelix, Salsa20. by reducing rounds State of the art: Poly1305, Could say, e.g., from 14 to, e.g., 10. around 4 cycles per byte “CryptMT is practically always No known attacks. plus encrypting 16 bytes. slower than Phelix Can speed up Salsa20 and should be eliminated”; Fastest encryption implies by reducing rounds but what if Phelix is broken? fastest authenticated encryption? from 20 to, e.g., 12 or 8. Not necessarily! Attacks on Py, SOSEMANUK No known attacks. Phelix includes authentication. were published in December. Do any other submissions Need more time for cryptanalysis. Benchmarks need to cover this. have a security margin? Speedup: security margin Slowdown: forgeries Can speed up AES Packets must be authenticated. by reducing rounds State of the art: Poly1305, from 14 to, e.g., 10. around 4 cycles per byte No known attacks. plus encrypting 16 bytes. Can speed up Salsa20 Fastest encryption implies by reducing rounds fastest authenticated encryption? from 20 to, e.g., 12 or 8. Not necessarily! No known attacks. Phelix includes authentication. Do any other submissions Benchmarks need to cover this. have a security margin? Speedup: security margin Slowdown: forgeries Slowdown: timing attacks Can speed up AES Packets must be authenticated. Typical AES software by reducing rounds leaks key through timing. State of the art: Poly1305, from 14 to, e.g., 10. Often attacker can see timing. around 4 cycles per byte No known attacks. plus encrypting 16 bytes. Constant-time AES software Can speed up Salsa20 is considerably slower. Fastest encryption implies by reducing rounds fastest authenticated encryption? Slowdown depends on cipher. from 20 to, e.g., 12 or 8. Not necessarily! CryptMT, Phelix, Salsa20: 0. No known attacks. Phelix includes authentication. DICING, Dragon, HC-256: ? Do any other submissions Benchmarks need to cover this. Benchmarks need to cover this. have a security margin? Slowdown: forgeries Slowdown: timing attacks Packets must be authenticated. Typical AES software leaks key through timing. State of the art: Poly1305, Often attacker can see timing. around 4 cycles per byte plus encrypting 16 bytes. Constant-time AES software is considerably slower. Fastest encryption implies fastest authenticated encryption? Slowdown depends on cipher. Not necessarily! CryptMT, Phelix, Salsa20: 0. Phelix includes authentication. DICING, Dragon, HC-256: ? Benchmarks need to cover this. Benchmarks need to cover this..
Recommended publications
  • Key Differentiation Attacks on Stream Ciphers
    Key differentiation attacks on stream ciphers Abstract In this paper the applicability of differential cryptanalytic tool to stream ciphers is elaborated using the algebraic representation similar to early Shannon’s postulates regarding the concept of confusion. In 2007, Biham and Dunkelman [3] have formally introduced the concept of differential cryptanalysis in stream ciphers by addressing the three different scenarios of interest. Here we mainly consider the first scenario where the key difference and/or IV difference influence the internal state of the cipher (∆key, ∆IV ) → ∆S. We then show that under certain circumstances a chosen IV attack may be transformed in the key chosen attack. That is, whenever at some stage of the key/IV setup algorithm (KSA) we may identify linear relations between some subset of key and IV bits, and these key variables only appear through these linear relations, then using the differentiation of internal state variables (through chosen IV scenario of attack) we are able to eliminate the presence of corresponding key variables. The method leads to an attack whose complexity is beyond the exhaustive search, whenever the cipher admits exact algebraic description of internal state variables and the keystream computation is not complex. A successful application is especially noted in the context of stream ciphers whose keystream bits evolve relatively slow as a function of secret state bits. A modification of the attack can be applied to the TRIVIUM stream cipher [8], in this case 12 linear relations could be identified but at the same time the same 12 key variables appear in another part of state register.
    [Show full text]
  • Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond
    This may be the author’s version of a work that was submitted/accepted for publication in the following source: Henricksen, Matthew& Dawson, Edward (2006) Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond. Lecture Notes in Computer Science, 4058, Article number: AISP52-63. This file was downloaded from: https://eprints.qut.edu.au/24788/ c Consult author(s) regarding copyright matters This work is covered by copyright. Unless the document is being made available under a Creative Commons Licence, you must assume that re-use is limited to personal use and that permission from the copyright owner must be obtained for all other uses. If the docu- ment is available under a Creative Commons License (or other specified license) then refer to the Licence for details of permitted re-use. It is a condition of access that users recog- nise and abide by the legal requirements associated with these rights. If you believe that this work infringes copyright please provide details by email to [email protected] Notice: Please note that this document may not be the Version of Record (i.e. published version) of the work. Author manuscript versions (as Sub- mitted for peer review or as Accepted for publication after peer review) can be identified by an absence of publisher branding and/or typeset appear- ance. If there is any doubt, please refer to the published source. https://doi.org/10.1007/11780656_5 Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond Matt Henricksen and Ed Dawson Information Security Institute, Queensland University of Technology, GPO Box 2434, Brisbane, Queensland, 4001, Australia.
    [Show full text]
  • New Results of Related-Key Attacks on All Py-Family of Stream Ciphers
    Journal of Universal Computer Science, vol. 18, no. 12 (2012), 1741-1756 submitted: 15/9/11, accepted: 15/2/12, appeared: 28/6/12 © J.UCS New Results of Related-key Attacks on All Py-Family of Stream Ciphers Lin Ding (Information Science and Technology Institute, Zhengzhou, China [email protected]) Jie Guan (Information Science and Technology Institute, Zhengzhou, China [email protected]) Wen-long Sun (Information Science and Technology Institute, Zhengzhou, China [email protected]) Abstract: The stream cipher TPypy has been designed by Biham and Seberry in January 2007 as the strongest member of the Py-family of stream ciphers. At Indocrypt 2007, Sekar, Paul and Preneel showed related-key weaknesses in the Py-family of stream ciphers including the strongest member TPypy. Furthermore, they modified the stream ciphers TPypy and TPy to generate two fast ciphers, namely RCR-32 and RCR-64, in an attempt to rule out all the attacks against the Py-family of stream ciphers. So far there exists no attack on RCR-32 and RCR-64. In this paper, we show that the related-key weaknesses can be still used to construct related-key distinguishing attacks on all Py-family of stream ciphers including the modified versions RCR- 32 and RCR-64. Under related keys, we show distinguishing attacks on RCR-32 and RCR-64 with data complexity 2139.3 and advantage greater than 0.5. We also show that the data complexity of the distinguishing attacks on Py-family of stream ciphers proposed by Sekar et al. can be reduced from 2193.7 to 2149.3 .
    [Show full text]
  • Security Evaluation of the K2 Stream Cipher
    Security Evaluation of the K2 Stream Cipher Editors: Andrey Bogdanov, Bart Preneel, and Vincent Rijmen Contributors: Andrey Bodganov, Nicky Mouha, Gautham Sekar, Elmar Tischhauser, Deniz Toz, Kerem Varıcı, Vesselin Velichkov, and Meiqin Wang Katholieke Universiteit Leuven Department of Electrical Engineering ESAT/SCD-COSIC Interdisciplinary Institute for BroadBand Technology (IBBT) Kasteelpark Arenberg 10, bus 2446 B-3001 Leuven-Heverlee, Belgium Version 1.1 | 7 March 2011 i Security Evaluation of K2 7 March 2011 Contents 1 Executive Summary 1 2 Linear Attacks 3 2.1 Overview . 3 2.2 Linear Relations for FSR-A and FSR-B . 3 2.3 Linear Approximation of the NLF . 5 2.4 Complexity Estimation . 5 3 Algebraic Attacks 6 4 Correlation Attacks 10 4.1 Introduction . 10 4.2 Combination Generators and Linear Complexity . 10 4.3 Description of the Correlation Attack . 11 4.4 Application of the Correlation Attack to KCipher-2 . 13 4.5 Fast Correlation Attacks . 14 5 Differential Attacks 14 5.1 Properties of Components . 14 5.1.1 Substitution . 15 5.1.2 Linear Permutation . 15 5.2 Key Ideas of the Attacks . 18 5.3 Related-Key Attacks . 19 5.4 Related-IV Attacks . 20 5.5 Related Key/IV Attacks . 21 5.6 Conclusion and Remarks . 21 6 Guess-and-Determine Attacks 25 6.1 Word-Oriented Guess-and-Determine . 25 6.2 Byte-Oriented Guess-and-Determine . 27 7 Period Considerations 28 8 Statistical Properties 29 9 Distinguishing Attacks 31 9.1 Preliminaries . 31 9.2 Mod n Cryptanalysis of Weakened KCipher-2 . 32 9.2.1 Other Reduced Versions of KCipher-2 .
    [Show full text]
  • 13-Cis-Retinoic Acid
    WORLD HEALTH ORGANIZATION INTERNATIONAL AGENCY FOR RESEARCH ON CANCER IARC Handbooks of Cancer Prevention Retinoids Volume 4 This publication represents the views and expert opinions of an IARC Working Group on the Evaluation of Cancer-preventive Agents, which met in Lyon, 24-30 March 1999 Published by the International Agency for Research on Cancer, 150 cours Albert Thomas, F-69372 Lyon cedex 08, France © International Agency for Research on Cancer, 1999 Distributed by Oxford University Press, Walton Street, Oxford, 0X2 6DP, UK (Fax: +44 1865 267782) and in the USA by Oxford University Press, 2001 Evans Road, Carey, NC 27513, USA (Fax: +1 919 677 1303). All IARC publications can also be ordered directly from IARCPress (Fax: +33 4 72 73 83 02; E-mail: [email protected]). Publications of the World Health Organization enjoy copyright protection in accordance with the provisions of Protocol 2 of the Universal Copyright Convention. All rights reserved. The designations used and the presentation of the material in this publication do not imply the expression of any opinion whatsoever on the part of the Secretariat of the World Health Organization concerning the legal status of any country, territory, city, or area or of its authorities, or concerning the delimitation of its frontiers or boundaries. The mention of specific companies or of certain manufacturers' products does not imply that they are endorsed or recommended by the World Health Organization in preference to others of a similar nature that are not mentioned. Errors and omissions excepted, the names of proprietary products are distinguished by initial capital letters.
    [Show full text]
  • Lecture 9: Using Block and Stream Ciphers for Secure Wired and Wifi Communications
    Lecture 9: Using Block and Stream Ciphers for Secure Wired and WiFi Communications Lecture Notes on “Computer and Network Security” by Avi Kak ([email protected]) February 18, 2021 3:33pm ©2021 Avinash Kak, Purdue University Goals: To present 2DES and its vulnerability to the meet-in-the-middle attack To present two-key 3DES and three-key 3DES To present the five different modes in which a block cipher can be used in practical systems for secure communications To discuss stream ciphers and to review RC4 stream cipher algorithm To review the security problems with the WEP protocol To review how AES is used in WPA2 for encryption and for data integrity check CONTENTS Section Title Page 9.1 Multiple Encryptions with DES for a More Secure 3 Cipher 9.2 Double DES 4 9.2.1 Can a Double-DES (2DES) Plaintext-to-Ciphertext Mapping be 6 Equivalent to a Single-DES Mapping? 9.2.2 Vulnerability of Double DES to the Meet-in-the-Middle Attack 11 9.3 Triple DES with Two Keys 16 9.3.1 Possible Ways to Attack 3DES Based on Two Keys 18 9.4 Triple DES with Three Keys 22 9.5 Five Modes of Operation for Block Ciphers 24 9.5.1 The Electronic Codebook Mode (ECB) 28 9.5.2 The Cipher Block Chaining Mode (CBC) 38 9.5.3 The Cipher Feedback Mode (CFB) 40 9.5.4 The Output Feedback Mode (OFB) 43 9.5.5 The Counter Mode (CTR) 45 9.6 Stream Ciphers 49 9.7 The RC4 Stream Cipher Algorithm 53 9.8 WEP, WPA, and WPA2 FOR WiFi Security 59 9.8.1 RC4 Encryption in WEP and WPA and Why You Must Switch 64 to WPA2? 9.8.2 Some Highly Successful Attacks on WEP 71 9.8.3 AES as Used in WPA2 88 9.9 Homework Problems 92 Computer and Network Security by Avi Kak Lecture 9 Back to TOC 9.1 MULTIPLE ENCRYPTIONS WITH DES FOR A MORE SECURE CIPHER As you already know, the DES cryptographic system is now known to not be secure.
    [Show full text]
  • The Truth on Tpy
    The Truth on TPy Eli Biham∗ Jennifer Seberry† February 29, 2008 Abstract In this note we refer to the security of the Py and TPy families, as discussed in several papers in recent years. We investigate the published attacks, and show that no attacks on TPy, TPypy and TPy6 have ever been published, whose complexities are within the bounds set by the security claims of these ciphers. Also, only a single attack on Py was published which may be considered within the scope of the security claims — as a response to this attack the Py family was tweaked to TPy, TPypy and TPy6. We conclude that the TPy family of ciphers is highly secure, and recommend using them in applications that require secure stream ciphers. 1 Introduction In this note we investigate the claims of the papers that study the Py and TPy families [2, 3, 4], and discuss their accuracy. As stated in the original paper on Py [2], the inventors of Py and TPy welcome any technique for the cryptanalysis or study of these families. The inventors of Py and TPy also believe that many of the techniques discussed in the various papers are interesting and important for the further study of these families, and point out some possible weaknesses that may be used in the future to attack these families. As such, we are especially pleased to thank the authors of [18] who found a weakness of the IV setup of the Py family, and thus allowed us to improve the ciphers, by a tweak, leading to the TPy family.
    [Show full text]
  • Symmetric Cryptography  Dagstuhl Seminar 
    07021 Abstracts Collection Symmetric Cryptography Dagstuhl Seminar Eli Biham1, Helena Handschuh2, Stefan Lucks3 and Vincent Rijmen4 1 Technion - Haifa, IL [email protected] 2 Spansion, Levallois-Perret, FR [email protected] 3 Univ. Mannheim, DE [email protected] 4 TU Graz, AT [email protected] Abstract. From .. to .., the Dagstuhl Seminar 07021 Symmetric Cryp- tography was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl. During the seminar, several participants pre- sented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this paper. The rst section describes the seminar topics and goals in general. Links to extended abstracts or full papers are provided, if available. Keywords. Authenticity, Integrity, Privacy, Block Ciphers, Stream Ci- phers, Hash Functions, Provable Security, Cryptanalysis 07021 Executive Summary Symmetric Cryptography The Seminar brought together about 35 researchers from industry and academia. Most of the participants came from dierent European countries, but quite a few also came from America and Asia. Almost all the participants gave a presenta- tion. Most of them gave a "regular" talk of 30 to 50 minutes (including discussion time), some gave a "rump session" talk, and a few even gave two presentations, a regular one and another at the rump session. Keywords: Authenticity, Integrity, Privacy, Block Ciphers, Stream Ciphers, Hash Functions, Provable Security, Cryptanalysis Joint work of: Biham, Eli; Handschuh, Helena; Lucks, Stefan; Rijmen, Vincent Extended Abstract: http://drops.dagstuhl.de/opus/volltexte/2007/1020 Dagstuhl Seminar Proceedings 07021 Symmetric Cryptography http://drops.dagstuhl.de/opus/volltexte/2007/1037 2 E.
    [Show full text]
  • DES, 3DES, AES, RSA and Blowfish
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Elsevier - Publisher Connector Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 78 ( 2016 ) 617 – 624 International Conference on Information Security & Privacy (ICISP2015), 11-12 December 2015, Nagpur, INDIA A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish a,* b c d Priyadarshini Patil , Prashant Narayankar ,Narayan D G , Meena S M aPriyadarshini Patil,Department of Information Science & Engineering , BVBCET , Hubli 5800031,India bPrashant Narayankar,Department of Information Science & Engineering , BVBCET , Hubli 5800031,India Abstract In today’s internet era, with online transactions almost every second and terabytes of data being generated everyday on the internet, securing information is a challenge. Cryptography is an integral part of modern world information security making the virtual world a safer place. Cryptography is a process of making information unintelligible to an unauthorized person. Hence, providing confidentiality to genuine users. There are various cryptographic algorithms that can be used. Ideally, a user needs a cryptographic algorithm which is of low cost and high performance. However, in reality such algorithm which is a one stop solution does not exist. There are several algorithms with a cost performance trade off. For example, a banking application requires utmost security at high cost and a gaming application sending player pattern for analytics does not bother much about security but needs to be fast and cost effective. Thus, amongst the cryptographic algorithms existing, we choose an algorithm which best fits the user requirements. In, this process of choosing cryptographic algorithms, a study of strengths, weakness, cost and performance of each algorithm will provide valuable insights.
    [Show full text]
  • Weak Keys and Cryptanalysis of a Cold War Block Cipher
    University College London Computer Science Department 2018 Weak Keys and Cryptanalysis of a Cold War Block Cipher Marios Georgiou MSc Information Security arXiv:1901.06504v1 [cs.CR] 19 Jan 2019 Supervised by Nicolas T. Courtois Extended Version This report is submitted as part requirement for the MSc in Information Security at University College London. It is substantially the result of my own work except where explicitly indicated in the text. The report may be freely copied and distributed provided the source is explicitly acknowledged. Abstract T-310 is a cipher that was used for encryption of governmental communications in East Ger- many during the final years of the Cold War. Due to its complexity and the encryption process, there was no published attack for a period of more than 40 years until 2018 by Nicolas T. Cour- tois et al. in [10]. In this thesis we study the so called 'long term keys' that were used in the cipher, in order to expose weaknesses which will assist the design of various attacks on T-310. Keywords: Cold War, T-310, block cipher, Linear Cryptanalysis, Generalised Linear Crypt- analysis, slide attacks, decryption oracle attacks i ii Acknowledgements I would like to thank my supervisor, Nicolas Tadeusz Courtois, for his guidance and support throughout the completion of this thesis. I would also like to thank Matteo Scarlata, a student at ETH Zurich, for the design of most of the figures that appear in this thesis. iii iv Contents Abstract i Acknowledgements iii 1 Introduction 1 1.1 Motivation and Goal . .1 1.2 Structure of the Thesis .
    [Show full text]
  • Cryptanalysis Techniques for Stream Cipher: a Survey
    Cryptanalysis Techniques for Stream Cipher: A Survey {tag} {/tag} International Journal of Computer Applications © 2012 by IJCA Journal Volume 60 - Number 9 Year of Publication: 2012 Authors: M. U. Bokhari Shadab Alam Faheem Syeed Masoodi 10.5120/9721-4187 {bibtex}pxc3884187.bib{/bibtex} Abstract Stream Ciphers are one of the most important cryptographic techniques for data security due to its efficiency in terms of resources and speed. This study aims to provide a comprehensive survey that summarizes the existing cryptanalysis techniques for stream ciphers. It will also facilitate the security analysis of the existing stream ciphers and provide an opportunity to understand the requirements for developing a secure and efficient stream cipher design. Refer ences - Christof Paar and Jan Pelzl. "Understanding Cryptography: A textbook for students and practitioners", 2010 Springer p. 7 ISBN 978-364204100-6 - W. Fischer, B. M. Gammel, O. Kniffler and J. Velton, "Differential Power Analysis of Stream Ciphers," Topics in Cryptology-CT-RSA 2007, Springer-Verlag, LNCS, Vol. 4377, pp. 257–270, 2007. - P. Kocher, J. Jaffe and B. Jun, "Differential Power Analysis", in the 1 / 5 Cryptanalysis Techniques for Stream Cipher: A Survey Proceedings of Crypto 1999, LNCS, vol 1666, pp 398–412, Santa-Barbara, CA, USA, August 1999. - J. -F. Dhem, F. Koeune, P. -A. Leroux, P. Mestré, J. -J. Quisquater, and J. -L. Willems, "A practical implementation of the timing attack", Proc. CARDIS 1998, Smart Card Research and Advanced Applications (J. -J. Quisquater and B. Schneier, eds. ), LNCS, Springer, 1998. - P. Kocher, "Timing attacks on implementations of Diffe-Hellman, RSA, DSS, and other systems", Advances in Cryptology - CRYPTO '96, Sant Barbara, California (N.
    [Show full text]
  • ATTACKING STREAM CIPHERS A.Mahendar1, Dr
    A Mahendar* et al. ISSN: 2250-3676 [IJESAT] [International Journal of Engineering Science & Advanced Technology] Volume-3, Issue-2,75-81 FUNDAMENTALS OF CRYPTANALYSIS: ATTACKING STREAM CIPHERS A.Mahendar1, Dr. E. Srinivas Reddy2, 1Research scholar, Department of Computer Science & Engineering, Acharya Nagarjuna University, AP, India, [email protected] 2 Professors, Department of Computer Science & Engineering, Acharya Nagarjuna University. AP, India, [email protected]. Abstract This article contains an elementary introduction to the cryptanalysis of stream ciphers. Initially, a few historical examples are given to explain the core aspects of cryptography and the various properties of stream ciphers. We define the mean- ing of cryptographic strength and show how to identify weaknesses in a cryptosystem. Then, we show how these cryptographic weaknesses can be exploited and attacked by a number of cryptanalytic techniques. The academic literature includes many articles there use complex mathematical notations to represent trivial cryptanalytic techniques. Contrarily, this paper tries to put forward the most commonly used cryptanalytic techniques by using only simplistic and comprehensible examples. The addressed techniques are used in several scientific articles to mount practical attacks on real cryptosystems. Index Terms: Cryptography, Stream Cipher, Cryptanalysis, Cryptanalysis Techniques. --------------------------------------------------------------------- *** ------------------------------------------------------------------------ 1. INTROCTION 1.1 Cryptographic strength Cryptography is a complex and mathematically challenging The strength of a cryptographic algorithm is expressed in the field of study. It involves taking some data or message and total amount of computations an adversary needs to perform to obfuscating it so that it is unreadable by parties that the recover the secret key. It is often referred to as the compu- message was not intended.
    [Show full text]