Procedimientos De Cifrado En Flujo

Total Page:16

File Type:pdf, Size:1020Kb

Procedimientos De Cifrado En Flujo Procedimientos de Cifrado en Flujo Amparo Fúster Sabater Instituto de Física Aplicada C.S.I.C. [email protected] A. Fúster Sabater INFOSEC-EMACOT Abril 2009 Contenido Introducción a la criptografía Procedimiento de cifrado en flujo Algoritmos de cifrado en flujo (Ejemplos) The eSTREAM Project A. Fúster Sabater INFOSEC-EMACOT Abril 2009 Criptología Criptología = Criptografía + Criptoanálisis Criptografía: desarrolla métodos de cifrado para proteger la información. Criptoanálisis: rompe dichos métodos para recuperar la información original. A. Fúster Sabater INFOSEC-EMACOT Abril 2009 Procedimiento Criptográfico: Esquema General CLAVE CLAVE Texto claro Texto cifrado Texto claro cifrado descifrado A B Criptoanálisis descriptado A. Fúster Sabater INFOSEC-EMACOT Abril 2009 Criptografía Actual Criptosistemas actuales Clave secreta Clave pública Cifrado en flujo Cifrado en bloque A. Fúster Sabater INFOSEC-EMACOT Abril 2009 Criptografía de clave secreta Métodos de cifrado en flujo La transformación se aplica sobre cada carácter del mensaje original Ejemplo: sobre cada bit del mensaje Métodos de cifrado en bloque La transformación se aplica sobre un grupo de caracteres del mensaje original Ejemplo: sobre grupos de 64 bits (DES) A. Fúster Sabater INFOSEC-EMACOT Abril 2009 Principios básicos (I) Sustitución Clave: A B C D E F G H I J K L M N O P Q R S T U V X Y Z P L O K N M J U I B V G Y T F C X D R E S Z A Q H Mensaje E S T O E S U N E J E M P L O Criptograma N R E F N R S T N B N Y C I F A. Fúster Sabater INFOSEC-EMACOT Abril 2009 Principios básicos (II) Transposición Clave: Grupos de 4 letras Transposición: 1234 ---- 4321 Mensaje S I S T E M A S C L A S I C O S Criptograma T S I S S A M E S A L C S O C I A. Fúster Sabater INFOSEC-EMACOT Abril 2009 Cifrado Vernam (1917) One-time Pad (Cifrado con cinta aleatoria) Clave: Secuencia binaria aleatoria de uso único Cifrado: YXii= ⊕ Zimod 2 Descifrado: XYii= ⊕ Zimod 2 Mensaje 00011 01111 01101 00101 10011 01111 01111 01110 Clave 11011 00101 01011 00110 10110 10101 01100 10010 Criptograma 11000 01010 00110 00011 00101 11010 00011 11100 Mensaje: come soon (Código ITA-2) A. Fúster Sabater INFOSEC-EMACOT Abril 2009 Condiciones de secreto perfecto (Shannon) Condiciones de aplicación: La clave se utiliza sólo una vez El criptoanalista tiene acceso sólo al criptograma Secreto perfecto: “El texto claro X es estadísticamente independiente del criptograma Y para todos los posibles textos claros y todos los posibles criptogramas” P(X = x | Y = y) = P(X = x) C.E. Shannon, “Communication Theory of Secrecy Systems”, Bell. Syst. Tech. J., 28 (1949), 656-715. A. Fúster Sabater INFOSEC-EMACOT Abril 2009 Cifrado Vernam: es viable? emisor receptor Mensaje 00011 01111 01101 Criptograma 11000 01010 00110 Sec. cifrante 11011 00101 01011 Sec. cifrante 11011 00101 01011 Criptograma 11000 01010 00110 Mensaje 00011 01111 01101 Centro de distribución de claves A. Fúster Sabater INFOSEC-EMACOT Abril 2009 Procedimiento de Cifrado en Flujo Clave Clave Algoritmo Algoritmo determinístico zi zi determinístico yi EMISOR RECEPTOR xi xi xi ⊕ zi = yi yi ⊕ zi = xi A. Fúster Sabater INFOSEC-EMACOT Abril 2009 Cifrado en flujo Sec. cifrante = Algoritmo + clave c1 • Sec. periódica • c Pseudoaleatoriedad 2 No estamos propiamente en condiciones de “secreto perfecto” c • 3 A. Fúster Sabater INFOSEC-EMACOT Abril 2009 Secuencia Cifrante: 1. ¿Qué características generales presentan estas secuencias? 2. ¿Cómo son los generadores que las producen? A. Fúster Sabater INFOSEC-EMACOT Abril 2009 Secuencias Cifrantes: Características Generales (I) Período (≈ 1038 bits) T = 2128 -1 ≈ 3,40 x 1038 bits 6 22 Vc = 120 x 10 bits/seg ⇒ 9,452 x 10 años 221x109 veces la edad del universo A. Fúster Sabater INFOSEC-EMACOT Abril 2009 Secuencias Cifrantes: Características Generales (II) Distribución de ceros y unos 0100110100111010110010010 rachas de ceros (gaps) rachas de unos (blocks) A. Fúster Sabater INFOSEC-EMACOT Abril 2009 Secuencias Cifrantes: Características Generales (III) Autocorrelación ACk()= (A− D)/T Sec.original 1 0 1 1 0 0 1 0 1 0 0 0 0 1 1 1 Sec. desplazada 0 0 1 0 1 0 0 0 0 1 1 1 1 0 1 1 Autocorrelación en fase: AC()k =1 Autocorrelación fuera de fase: AC()k ∈[−1,1] A. Fúster Sabater INFOSEC-EMACOT Abril 2009 Postulados de pseudoaleatoriedad de Golomb G1: En cada período de la secuencia considerada el número de 1’s tiene que ser aproximadamente igual al número de 0’s. G2: En cada período de la secuencia considerada la mitad de las rachas, del número total de rachas observadas, tiene longitud 1, la cuarta parte longitud 2, la octava parte longitud 3 … etc. Para cada longitud habrá el mismo número de blocks que de gaps. G3: La autocorrelación AC(k) fuera de fase tiene que ser constante para todo valor de k. A. Fúster Sabater INFOSEC-EMACOT Abril 2009 Registros de desplazamiento realimentados linealmente (LFSR) xx4 ++1 • • 1 0 0 0 ↔ 1 0 0 0 0 0 0 1 Parámetros del registro 0 0 1 1 Longitud L (T = 2L –1) PN-secuencia 0 1 1 1 Polinomio de realimentación 1 1 1 1 Funcionamiento 1 1 1 0 Desplazamiento del contenido binario 1 1 0 1 Entra bit realimentado 1 0 1 0 Secuencia generada: 1 0 0 0 1 1 1 1 …… KKK A. Fúster Sabater INFOSEC-EMACOT Abril 2009 Registros de desplazamiento realimentados linealmente (LFSR) xx4 ++1 1 0 0 0 ↔ • • Relación de recurrencia lineal 1 0 0 0 0 0 0 1 aann++43= ⊕≥ann0 0 0 1 1 aa43= ⊕ a0 0 1 1 1 1 1 1 1 aa54= ⊕ a1 1 1 1 0 MM 1 1 0 1 Cada elemento se expresa en función de los 1 0 1 0 anteriores (relación lineal) KKK A. Fúster Sabater INFOSEC-EMACOT Abril 2009 Criptosistemas de cifrado en flujo Generadores de secuencia binaria Basados en Registros (LFSR) Clave: contenido inicial de estos registros Long. Clave = No. etapas en los LFSRs Hipótesis de partida: Conocimiento del esquema de generación Conocimiento de una cantidad de la secuencia de salida A. Fúster Sabater INFOSEC-EMACOT Abril 2009 Generador de Geffe (1973) x LFSR 1 1 0 x zi LFSR 2 2 1 x3 LFSR 3 SELECTOR F(x1, x2 , x3 ) = x1 ⊕ x1x3 ⊕ x2 x3 A. Fúster Sabater INFOSEC-EMACOT Abril 2009 Generador de Beth-Piper (1981) at2 () LFSR2 at1() XOR bt() LFSR1 AND LFSR3 at() • 3 Φ • Φ Función pulsos de reloj A. Fúster Sabater INFOSEC-EMACOT Abril 2009 El Generador Shrinking (1993) Generador binario muy sencillo (Crypto’93) Compuesto de dos LFSRs: LFSR1 y LFSR2 a LFSR 1 i clock P c j b LFSR 2 i Según P, LFSR1 (registro de control) decima la secuencia producida por LFSR2 A. Fúster Sabater INFOSEC-EMACOT Abril 2009 El Generador Shrinking (Un ejemplo) LFSRs: 2 3 ¾ LFSR1: L1=3, P1(x)=1+x +x , IS1=(1,0,0) 4 ¾ LFSR2: L2=4, P2(x)=1+x+x , IS2=(1,0,0,0) Ley de decimación P: {ai}= 1 0 0 1 0 1 1 1 0 0 1 0 1 1 1 … {bi}= 1 0 0 0 1 1 1 1 0 1 0 1 1 0 0 … {cj}= 1 0 1 1 1 0 1 0 0 … Los bits subrayados (1 y 0) se eliminan A. Fúster Sabater INFOSEC-EMACOT Abril 2009 Algoritmos de cifrado A5 A B Algoritmo A5: generador de secuencia pseudoaleatoria Uso: cifrado del enlace entre el teléfono móvil y la estación base (Telefonía G.S.M.) A5/1 (países europeos) Doble versión: A5/2 (fuera de Europa) A. Fúster Sabater INFOSEC-EMACOT Abril 2009 Telefonía G.S.M. (Global System for Mobile Communications) Conversación G.S.M. = secuencia de tramas Trama = 228 bits enviada cada 4,6 milisegundos Cifrado de la conversación: 0 0 0 0 1 1 0 1 … texto claro (conversación digitalizada) 1 0 1 1 0 1 0 1 … sec. cifrante (producida por algoritmo A5) 1 0 1 1 1 0 0 0 … sec. cifrada (conversación cifrada) Algoritmos criptográficos G.S.M. : A5/1, A5/2 (cifrado) Estos algoritmos nunca fueron publicados oficialmente M. Briceno esquemas funcionales del A5/1 y A5/2 (ingeniería inversa) (http://cryptome.org/gsm-a512.htm) A. Fúster Sabater INFOSEC-EMACOT Abril 2009 Cifrado/Descifrado en A5/1 • emisor 001…10 010…11 110…01 ….. (texto claro) 011…01 000…10 010…11 ….. (sec. cifrante) 010…11 010…01 100…10 ….. (texto cifrado) • receptor 010…11 010…01 100…10 ….. (texto cifrado) 011…01 000…10 010…11 ….. (sec. cifrante) 001…10 010…11 010…11 ….. (texto claro) A5/1 es un generador de secuencia cifrante controlado por 64 bits de clave A. Fúster Sabater INFOSEC-EMACOT Abril 2009 Algoritmo A5/1 19 14 c1 1 1 0 R1 22 c2 1 1 0 1 R2 23 c3 8 1 0 0 R3 • Estado interno: 19 + 22 + 23 = 64 bits • Función mayoría (c1,c2,c3) = (0,1,0), R1 y R3 desplazan A. Fúster Sabater INFOSEC-EMACOT Abril 2009 AlgoritmoAlgoritmo E0E0 A. Fúster Sabater INFOSEC-EMACOT Abril 2009 The eSTREAM PROJECT: Generalidades Iniciativa de la Universidad de Lovaina en 2004 En el marco del SASC’04 (the State of the Art of Stream Cipher) Finalidad: Convocatoria para la presentación de primitivas criptográficas de cifrado en flujo “Standard” de Cifrado en Flujo Dirección Web: http://www.ecrypt.eu.org/stream/index.html A. Fúster Sabater INFOSEC-EMACOT Abril 2009 The eSTREAM PROJECT: Requerimientos PERFIL 1 Aplicación software con alta velocidad de salida de bits cifrados (throughput) Longitud de clave: 128 bits Longitud de IV: 64 – 128 bits PERFIL 2 Aplicación hardware con recursos limitados: memoria, no.
Recommended publications
  • Detection and Exploitation of Small Correlations in Stream Ciphers
    Detection and Exploitation of Small Correlations in Stream Ciphers Masterthesis conducted under the guidance of Prof. Dr. Joachim Rosenthal and Dr. Gérard Maze Institute of Mathematics, University of Zurich 2008 Urs Wagner Outline This thesis gives an overview of stream ciphers based on linear feedback shift registers (LFSR) and their vulnerability to correlation attacks. In the rst chapter, a short introduction to symmetric key ciphers is given. The main focus hereby is on LFSR based stream ciphers. Further, the principles of LFSR are presented. The chapter is then closed by a stream cipher example, the Gee Generator. The second chapter treats the general approach of correlation attacks. Moreover a correlation attack is mounted on the Gee Generator and the practical results are presented. Boolean functions play an important role in stream cipher designs. The Walsh transform, a tool to analyze the cryptographic properties of Boolean functions, is introduced in chapter 3. Additionally, the cryptographic properties themselves are discussed. In the fourth chapter, an improved kind of correlation attack -the fast correlation attack- is presented. It exploits the same weaknesses in the stream cipher designs as the correlation attack, the mode of operation is however dierent. In the last chapter, the insights gained in the previous chapters are used to suggest an attack on a stream cipher by Philips, named Hitag 2. 1 Acknowledgments This thesis was written in the course of my master's studies at the University of Zurich. I am grateful to Prof. Joachim Rosenthal who gave me the opportunity to write my master thesis in cryptography. Special thanks go to Dr.
    [Show full text]
  • Analysis of Selected Block Cipher Modes for Authenticated Encryption
    Analysis of Selected Block Cipher Modes for Authenticated Encryption by Hassan Musallam Ahmed Qahur Al Mahri Bachelor of Engineering (Computer Systems and Networks) (Sultan Qaboos University) – 2007 Thesis submitted in fulfilment of the requirement for the degree of Doctor of Philosophy School of Electrical Engineering and Computer Science Science and Engineering Faculty Queensland University of Technology 2018 Keywords Authenticated encryption, AE, AEAD, ++AE, AEZ, block cipher, CAESAR, confidentiality, COPA, differential fault analysis, differential power analysis, ElmD, fault attack, forgery attack, integrity assurance, leakage resilience, modes of op- eration, OCB, OTR, SHELL, side channel attack, statistical fault analysis, sym- metric encryption, tweakable block cipher, XE, XEX. i ii Abstract Cryptography assures information security through different functionalities, es- pecially confidentiality and integrity assurance. According to Menezes et al. [1], confidentiality means the process of assuring that no one could interpret infor- mation, except authorised parties, while data integrity is an assurance that any unauthorised alterations to a message content will be detected. One possible ap- proach to ensure confidentiality and data integrity is to use two different schemes where one scheme provides confidentiality and the other provides integrity as- surance. A more compact approach is to use schemes, called Authenticated En- cryption (AE) schemes, that simultaneously provide confidentiality and integrity assurance for a message. AE can be constructed using different mechanisms, and the most common construction is to use block cipher modes, which is our focus in this thesis. AE schemes have been used in a wide range of applications, and defined by standardisation organizations. The National Institute of Standards and Technol- ogy (NIST) recommended two AE block cipher modes CCM [2] and GCM [3].
    [Show full text]
  • Comparing Some Pseudo-Random Number Generators and Cryptography Algorithms Using a General Evaluation Pattern
    I.J. Information Technology and Computer Science, 2016, 9, 25-31 Published Online September 2016 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijitcs.2016.09.04 Comparing Some Pseudo-Random Number Generators and Cryptography Algorithms Using a General Evaluation Pattern Ahmad Gaeini Imam Husein Comprehensive University, Iran E-mail: [email protected] Abdolrasoul Mirghadri1, Gholamreza Jandaghi2, Behbod Keshavarzi3 1Imam Husein Comprehensive University, Iran, E-mail: [email protected] 2Corresponding Author, University of Tehran, Farabi College, E-mail: [email protected] 3Shahed University, E-mail: [email protected] Abstract—Since various pseudo-random algorithms and generated by using chaotic systems and perturbation and sequences are used for cryptography of data or as initial by choosing least significant bits (LSB’s).In [4] and [5], values for starting a secure communication, how these chaotic maps have been used to design a cryptographic algorithms are analyzed and selected is very important. In algorithm; furthermore, output sequence has been fact, given the growingly extensive types of pseudo- statistically analyzed and method has also been evaluated random sequences and block and stream cipher in term of vulnerability to a variety of attacks, which has algorithms, selection of an appropriate algorithm needs proved the security of algorithm. In [6], a new an accurate and thorough investigation. Also, in order to pseudorandom number generator based on a complex generate a pseudo-random sequence and generalize it to a number chaotic equation has been introduced and cryptographer algorithm, a comprehensive and regular randomness of the produced sequence has been proven by framework is needed, so that we are enabled to evaluate NIST tests.
    [Show full text]
  • On the Design and Analysis of Stream Ciphers Hell, Martin
    On the Design and Analysis of Stream Ciphers Hell, Martin 2007 Link to publication Citation for published version (APA): Hell, M. (2007). On the Design and Analysis of Stream Ciphers. Department of Electrical and Information Technology, Lund University. Total number of authors: 1 General rights Unless other specific re-use rights are stated the following general rights apply: Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal Read more about Creative commons licenses: https://creativecommons.org/licenses/ Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. LUND UNIVERSITY PO Box 117 221 00 Lund +46 46-222 00 00 On the Design and Analysis of Stream Ciphers Martin Hell Ph.D. Thesis September 13, 2007 Martin Hell Department of Electrical and Information Technology Lund University Box 118 S-221 00 Lund, Sweden e-mail: [email protected] http://www.eit.lth.se/ ISBN: 91-7167-043-2 ISRN: LUTEDX/TEIT-07/1039-SE c Martin Hell, 2007 Abstract his thesis presents new cryptanalysis results for several different stream Tcipher constructions.
    [Show full text]
  • Adding MAC Functionality to Edon80
    194 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.1, January 2007 Adding MAC Functionality to Edon80 Danilo Gligoroski and Svein J. Knapskog “Centre for Quantifiable Quality of Service in Communication Systems”, Norwegian University of Science and Technology, Trondheim, Norway Summary VEST. At the time of writing, it seams that for NLS and In this paper we show how the synchronous stream cipher Phelix some weaknesses have been found [11,12]. Edon80 - proposed as a candidate stream cipher in Profile 2 of Although the eSTREAM project does not accept anymore the eSTREAM project, can be efficiently upgraded to a any tweaks or new submissions, we think that the design synchronous stream cipher with authentication. We are achieving of an efficient authentication techniques as a part of the that by simple addition of two-bit registers into the e- internal definition of the remaining unbroken stream transformers of Edon80 core, an additional 160-bit shift register and by putting additional communication logic between ciphers of Phase 2 of eSTREAM project still is an neighboring e-transformers of the Edon80 pipeline core. This important research challenge. upgrade does not change the produced keystream from Edon80 Edon80 is one of the stream ciphers that has been and we project that in total it will need not more then 1500 gates. proposed for hardware based implementations (PROFILE A previous version of the paper with the same title that has been 2) [13]. Its present design does not contain an presented at the Special Workshop “State of the Art of Stream authentication mechanism by its own.
    [Show full text]
  • Analysis of Lightweight Stream Ciphers
    ANALYSIS OF LIGHTWEIGHT STREAM CIPHERS THÈSE NO 4040 (2008) PRÉSENTÉE LE 18 AVRIL 2008 À LA FACULTÉ INFORMATIQUE ET COMMUNICATIONS LABORATOIRE DE SÉCURITÉ ET DE CRYPTOGRAPHIE PROGRAMME DOCTORAL EN INFORMATIQUE, COMMUNICATIONS ET INFORMATION ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE POUR L'OBTENTION DU GRADE DE DOCTEUR ÈS SCIENCES PAR Simon FISCHER M.Sc. in physics, Université de Berne de nationalité suisse et originaire de Olten (SO) acceptée sur proposition du jury: Prof. M. A. Shokrollahi, président du jury Prof. S. Vaudenay, Dr W. Meier, directeurs de thèse Prof. C. Carlet, rapporteur Prof. A. Lenstra, rapporteur Dr M. Robshaw, rapporteur Suisse 2008 F¨ur Philomena Abstract Stream ciphers are fast cryptographic primitives to provide confidentiality of electronically transmitted data. They can be very suitable in environments with restricted resources, such as mobile devices or embedded systems. Practical examples are cell phones, RFID transponders, smart cards or devices in sensor networks. Besides efficiency, security is the most important property of a stream cipher. In this thesis, we address cryptanalysis of modern lightweight stream ciphers. We derive and improve cryptanalytic methods for dif- ferent building blocks and present dedicated attacks on specific proposals, including some eSTREAM candidates. As a result, we elaborate on the design criteria for the develop- ment of secure and efficient stream ciphers. The best-known building block is the linear feedback shift register (LFSR), which can be combined with a nonlinear Boolean output function. A powerful type of attacks against LFSR-based stream ciphers are the recent algebraic attacks, these exploit the specific structure by deriving low degree equations for recovering the secret key.
    [Show full text]
  • International Conference on Aquatic Invasive Species
    FINAL PROGRAM Global Action Against Aquatic Invasive Species October 22-26, 2017 Marriott Coral Springs Fort Lauderdale, Florida th 20International Conference on Aquatic Invasive Species Host Conference Secretariat ICAIS Steering Committee Tracey Cooke Lyn Gettys Conference Secretariat Chair, Technical Program Committee Executive Director, Invasive Species Centre University of Florida IFAS Center for Aquatic and Invasive Plants Technical Program Committee Sarah Bailey Sophie Monfette Fisheries and Oceans Canada Ontario Federation of Anglers and Hunters Becky Cudmore Alison Morris Fisheries and Oceans Canada Ontario Federation of Anglers and Hunters Erika Jensen Jeff Brinsmead Great Lakes Commission Ontario Ministry of Natural Resources and Forestry Jill Wingfield Stephen Phillips Great Lakes Fishery Commission Pacific States Marine Fisheries Commission Frances Lucy Jaimie T.A. Dick Institute of Technology, Sligo Queen's University Belfast Glenn Benoy Rob Leuven International Joint Commission Radboud University Nijmegen Rebecca Schroeder Renata Claudi Invasive Species Centre RNT Consulting Deb Sparks Douglas Jensen Invasive Species Centre University of Minnesota Sea Grant Program Lauren Tonelli Al Cofrancesco Invasive Species Centre U.S. Army Corps of Engineers Gail Wallin Linda Nelson Invasive Species Council of B.C. U.S. Army Corps of Engineers Conference Administrator Elizabeth Muckle-Jeffs The Professional Edge Toll Free (North America) 1-800-868-8776 International: 613-732-7068 E: [email protected] Web: www.icais.org
    [Show full text]
  • Forest Health Technology Enterprise Team Biological Control of Invasive
    Forest Health Technology Enterprise Team TECHNOLOGY TRANSFER Biological Control Biological Control of Invasive Plants in the Eastern United States Roy Van Driesche Bernd Blossey Mark Hoddle Suzanne Lyon Richard Reardon Forest Health Technology Enterprise Team—Morgantown, West Virginia United States Forest FHTET-2002-04 Department of Service August 2002 Agriculture BIOLOGICAL CONTROL OF INVASIVE PLANTS IN THE EASTERN UNITED STATES BIOLOGICAL CONTROL OF INVASIVE PLANTS IN THE EASTERN UNITED STATES Technical Coordinators Roy Van Driesche and Suzanne Lyon Department of Entomology, University of Massachusets, Amherst, MA Bernd Blossey Department of Natural Resources, Cornell University, Ithaca, NY Mark Hoddle Department of Entomology, University of California, Riverside, CA Richard Reardon Forest Health Technology Enterprise Team, USDA, Forest Service, Morgantown, WV USDA Forest Service Publication FHTET-2002-04 ACKNOWLEDGMENTS We thank the authors of the individual chap- We would also like to thank the U.S. Depart- ters for their expertise in reviewing and summariz- ment of Agriculture–Forest Service, Forest Health ing the literature and providing current information Technology Enterprise Team, Morgantown, West on biological control of the major invasive plants in Virginia, for providing funding for the preparation the Eastern United States. and printing of this publication. G. Keith Douce, David Moorhead, and Charles Additional copies of this publication can be or- Bargeron of the Bugwood Network, University of dered from the Bulletin Distribution Center, Uni- Georgia (Tifton, Ga.), managed and digitized the pho- versity of Massachusetts, Amherst, MA 01003, (413) tographs and illustrations used in this publication and 545-2717; or Mark Hoddle, Department of Entomol- produced the CD-ROM accompanying this book.
    [Show full text]
  • Cryptanalysis of Achterbahn-128/80
    Cryptanalysis of Achterbahn-128/80 María Naya-Plasencia? INRIA, projet CODES, Domaine de Voluceau 78153 Le Chesnay Cedex, FRANCE [email protected] Abstract. This paper presents two key-recovery attacks against Achter- bahn-128/80, the last version of one of the stream cipher proposals in the eSTREAM project. The attack against the 80-bit variant, Achterbahn- 80, has complexity 261. The attack against Achterbahn-128 requires 280.58 operations and 260 keystream bits. These attacks are based on an im- provement of the attack due to Hell and Johansson against Achterbahn version 2. They mainly rely on an algorithm that makes prot of the independence of the constituent registers. Keywords: stream cipher, eSTREAM, Achterbahn, cryptanalysis, correlation attack, linear approximation, parity check, key-recovery attack. 1 Introduction Achterbahn [4, 6] is a stream cipher proposal submitted to the eSTREAM project. After the cryptanalysis of the rst two versions [10, 9], it has moved on to a new one called Achterbahn-128/80 [5] published in June 2006. Achterbahn-128/80 corresponds to two keystream generators with key sizes of 128 bits and 80 bits, respectively. Their maximal keystream length is limited to 263. We present here two attacks against both generators. The attack against the 80-bit variant, Achterbahn-80, has complexity 261. The attack against Achterbahn- 128 requires 280.58 operations and 261 keystream bits. These attacks are based on an improvement of the attack against Achterbahn version 2 and also on an algorithm that makes prot of the independence of the constituent registers. The paper is organized as follows.
    [Show full text]
  • Revisiting a Recent Resource-Efficient Technique For
    Revisiting a Recent Resource-efficient Technique for Increasing the Throughput of Stream Ciphers Frederik Armknecht and Vasily Mikhalev Universit¨at Mannheim, Mannheim, Germany Keywords: Stream Ciphers, Feedback Shift Registers, Implementation, Throughput, Pipelining, Galois Configuration. Abstract: At CT-RSA 2014, Armknecht and Mikhalev presented a new technique for increasing the throughput of stream ciphers that are based on Feedback Shift Registers (FSRs) which requires practically no additional memory. The authors provided concise sufficient conditions for the applicability of this technique and demonstrated its usefulness on the stream cipher Grain-128. However, as these conditions are quite involved, the authors raised as an open question if and to what extent this technique can be applied to other ciphers as well. In this work, we revisit this technique and examine its applicability to other stream ciphers. On the one hand we show on the example of Grain-128a that the technique can be successfully applied to other ciphers as well. On the other hand we list several stream ciphers where the technique is not applicable for different structural reasons. 1 INTRODUCTION ciphers as well. In this work, we revisit this technique and shed new light on this technique. More precisely, Stream ciphers are designed for efficiently encrypting we provide both positive and negative results. On the data streams of arbitrary length. Ideally a stream ci- positive side, we successfully apply this technique to pher should not only be secure but also have a low Grain-128a. On the negative side we explain for sev- hardware size and high throughput. Consequently eral FSR-based stream ciphers that the technique can- several papers address the question of optimizing not be used for structural reasons.
    [Show full text]
  • Upper Columbia Basin Network Integrated Water Quality Monitoring Protocol
    National Park Service U.S. Department of the Interior Natural Resource Program Center Upper Columbia Basin Network Integrated Water Quality Monitoring Protocol Standard Operating Procedures Version 1.0 (Appendix A to Narrative Version 1.0) Natural Resource Report NPS/UCBN/NRR—2008/026 ON THE COVER John Day River during spring run-off, John Day Fossil Beds National Monument Photograph courtesy of Chris Caudill, University of Idaho Upper Columbia Basin Network Integrated Water Quality Monitoring Protocol Standard Operating Procedures Version 1.0 (Appendix A to Narrative Version 1.0) Natural Resource Report NPS/UCBN/NRR—2008/026 Eric N. Starkey Biological Technician National Park Service Moscow, ID 83844-1136 Lisa K. Garrett Network Coordinator National Park Service Moscow, ID 83844-1136 Thomas J. Rodhouse Ecologist National Park Service Bend, OR 97701 Gordon H. Dicus Data Manager National Park Service Moscow, ID 83844-1136 R. Kirk Steinhorst, Ph.D. Department of Statistics University of Idaho Moscow, ID 83844 February 2008 U.S. Department of the Interior National Park Service Natural Resource Program Center Fort Collins, Colorado The National Park Service, Natural Resource Program Center publishes a range of reports that address natural resource topics of interest and applicability to a broad audience in the National Park Service and others in natural resource management, including scientists, conservation and environmental constituencies, and the public. The Natural Resource Report Series is used to disseminate high-priority, current natural resource management information with managerial application. The series targets a general, diverse audience, and may contain NPS policy considerations or address sensitive issues of management applicability.
    [Show full text]
  • Thelatchkey01millarch Luradocu
    THE LATCH KEY < STi /} i MY BOOK HOUSE THE LATCH KEY THE LATCH KEY ERE stands a house all built of thought, H And full to overflowing Of treasures and of precious things, Of secrets for my knowing. Its windows look out far and wide From each of all its stories. I'll take the key and enter in; For me are all its glories. THE LATCH KEY x-» of ;V\Y BGOKHOUSE Edited by Olive Beaupre Miller CHICAGO BGOKHOUSE fir CHILDREN PUBLISHERS G Copyright, 1921 By OLIVE BEAUPRE MILLER All Rights Reserved Printed in U. S. A. C ONTENTS OF THE LATCH KEY PAGE IDEALS—(John Dryden) 7 SKETCHES FROM THE LIVES OF THE AUTHORS .... 8 (Arranged alphabetically) THE INTERESTING HISTORY OF OLD MOTHER GOOSE . 170 THE ORIGIN OF THE FOLK TALES 178 WHAT IS A MYTH? 185 EPIC POETRY AND THE WORLD'S GREAT EPICS .... 189 How To JUDGE STORIES FOR CHILDREN 200 INDEX TO AUTHORS, TITLES AND PRINCIPAL CHARACTERS * 218 GEOGRAPHICAL INDEX 258 HISTORICAL INDEX 268 SPECIAL SUBJECTS INDEX 272 INTRODUCTION TO INDEX ACCORDING TO ETHICAL THEME . 300 INDEX ACCORDING TO ETHICAL THEME 302 THE LATCH KEY What the child admired, The youth endeavored and the n man acquired. MY BOOK HOUSE AESOP (Greek, About 619-564 B. C.) OMEWHERE in ancient Greece, the land of white- pillared cities and stately marble temples, was born the little slave boy, Aesop. While he was still a child, Aesop was brought to the far-famed city of Athens. There he was sold, like an ox or a sheep, from one master to another and performed in each household the hard and thankless duties of a slave.
    [Show full text]