Skip to main content

On the security of self-synchronous ciphers

  • Cryptographic Functions And Ciphers
  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1270))

Included in the following conference series:

Abstract

Self-synchronous encryption can provide private communications across channels that are prone to bit-slip (insertion/deletion) errors. Under these conditions, conventional synchronous stream ciphers suffer catastrophic message loss, whereas self-synchronous ciphers (SSCs) automatically re-synchronise after a short error burst, with no additional circuitry or protocols. In this paper we point out some security problems of SSCs which are unavoidable, basically due to the fact that all of their input is sliding ciphertext, which may be chosen by a cryptanalyst. Although apparently similar in structure to nonlinear filter generator stream ciphers, self-synchronous ciphers are subject to quite different cryptanalytic attacks, which we briefly describe. Finally, we present a new class of designs for SSCs which are intended to resist sliding input attacks by maintaining a uniform distribution of internal data values in the feedback stage and subsequently.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R. Anderson. Searching for the Optimum Correlation Attack. In Fast Software Encryption, 1994 Leuven Workshop, LNCS, volume 1008, pages 137–143. Springer-Verlag, 1994.

    Google Scholar 

  2. R.J. Anderson. Tree Functions and Cipher Systems. Cryptologia, 15(3): 194–202, July 1991.

    Google Scholar 

  3. J. Daemen. Cipher and Hash Function Design. PhD thesis, Catholic University of Leuven, 1995.

    Google Scholar 

  4. H. Feistel, W. Notz, and J. Smith. Some Cryptographic Techniques for Machine-to-Machine Data Communications. Proceedings of the IEEE, 63(11):1545–1554, November 1975.

    Google Scholar 

  5. H. Fredricksen. The Number of Nonlinear Shift Registers That Produce All Vectors of Weight ≤; t. IEEE Transactions on Information Theory, 39(6):1989–1990, November 1993.

    Article  Google Scholar 

  6. J.Dj. Golic. On Security of Nonlinear Filter Generators. In Fast Software Encryption, 1996 Cambridge Workshop, LNCS, volume 1039, pages 173–188. Springer-Verlag, 1995.

    Google Scholar 

  7. J.Dj. Golic. Fast Low Order Approximation of Cryptographic Functions. In Advances in Cryptology — Eurocrypt '96, Proceedings, LNCS, volume 1070, pages 268–282. Springer-Verlag, 1996.

    Google Scholar 

  8. S.W. Golomb, R.E. Peile, and H. Taylor. Nonlinear Shift Registers that Produce All Vectors of Weight ≤; t. IEEE Transactions on Information Theory, 38(3):1181–1183, May 1992.

    Article  Google Scholar 

  9. J.B. Kam and G.I. Davida. Structured Design of Substitution-Permutation Encryption Networks. IEEE Transactions on Computers, 28(10):747–753, October 1979.

    Google Scholar 

  10. L. Knudsen. Truncated and Higher Order Differentials. In Fast Software Encryption, 1994 Leuven Workshop, LNCS, volume 1008, pages 196–211. Springer-Verlag, 1994.

    Google Scholar 

  11. S. Lee, S. Chee, S. Park, and S. Park. Conditional Correlation Attack on Nonlinear Filter Generators. In Advances in Cryptology — Asiacrypt '96, Proceedings, LNCS, volume 1163, pages 360–367. Springer-Verlag, 1996.

    Google Scholar 

  12. J.L. Massey. Shift-Register Synthesis and BCH Decoding. IEEE Transactions on Information Theory, 15(1):122–127, January 1969.

    Google Scholar 

  13. M. Matsui. Linear Cryptanalysis Method for DES Cipher. In Advances in Cryptology — Eurocrypt '93, Proceedings, LNCS, volume 765, pages 386–397. Springer-Verlag, 1993.

    Google Scholar 

  14. U.M. Maurer. New Approaches to the Design of Self-Synchronizing Stream Ciphers. In Advances in Cryptology — Eurocrypt '91, Proceedings, LNCS, volume 547, pages 458–471. Springer-Verlag, 1991.

    Google Scholar 

  15. W. Millan. Low Order Approximation of Cipher Functions. In Cryptology: Policy and Algorithms Conference, Proceedings, LNCS, volume 1029, pages 144–155. Springer-Verlag, 1995.

    Google Scholar 

  16. O.S. Rothaus. On Bent Functions. Journal of Combinatorial Theory (A), 20:300–305, 1976.

    Article  Google Scholar 

  17. J.E. Savage. Some Simple Self-Synchronizing Digital Data Scramblers. The Bell System Technical Journal, pages 449–487, February 1967.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Vijay Varadharajan Josef Pieprzyk Yi Mu

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Millan, W., Dawson, E. (1997). On the security of self-synchronous ciphers. In: Varadharajan, V., Pieprzyk, J., Mu, Y. (eds) Information Security and Privacy. ACISP 1997. Lecture Notes in Computer Science, vol 1270. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0027923

Download citation

  • DOI: https://doi.org/10.1007/BFb0027923

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63232-0

  • Online ISBN: 978-3-540-69237-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics