Abstract
This paper overviews basic theory on distinguishing attacks on stream ciphers. It illustrates underlying ideas and common techniques without going into too many details on each topic. Some new approaches in distinguishing attacks are also included.
Similar content being viewed by others
References
Baignères, T., Junod, P., Vaudenay, S.: How far can we go beyond linear cryptanalysis? In: Advances in Cryptology—ASIACRYPT 2004, Lecture Notes in Computer Science, vol. 3329, pp. 432–450. Springer, New York (2004)
Berbain, C., Gilbert, H., Patarin, J.: QUAD: a practical stream cipher with provable security. In: Advances in Cryptology—EUROCRYPT 2006, Lecture Notes in Computer Science, vol. 4004, pp. 109–128. Springer, New York (2006)
Biham, E., Seberry, J.: Py (roo): a fast and secure stream cipher using rolling arrays. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/023. http://www.ecrypt.eu.org/stream (2005)
Biham, E., Seberry, J.: Pypy: another version of Py. eSTREAM, ECRYPT Stream Cipher Project, Report 2006/038. http://www.ecrypt.eu.org/stream (2006)
Biham, E., Seberry, J.: Tweaking the IV setup of the Py family of stream ciphers—the ciphers TPy, TPypy, and TPy6. eSTREAM, ECRYPT Stream Cipher Project, Report 2007/038. http://www.ecrypt.eu.org/stream (2007)
Biryukov, A.: The design of a stream cipher LEX. In: Selected Areas in Cryptography—SAC 2006, Preproceedings, Montreal, 17-18 August 2006
Blum, L., Blum, M., Shub, M.: A simple unpredictable pseudo-random number generator. SIAM J. Comput. 15(2), 364–383 (1986)
Braeken, A., Lano, J.: On the (im)possibility of practical and secure nonlinear filters and combiners. In: Preneel, B., Tavares, S. (eds.) Selected Areas in Cryptography—SAC 2005, Lecture Notes in Computer Science, vol. 3897, pp. 159–174. Springer, New York (2005)
Chepyzhov, V., Johansson, T., Smeets, B.: A simple algorithm for fast correlation attacks on stream ciphers. In: Schneier, B. (ed.) Fast Software Encryption 2000, Lecture Notes in Computer Science, vol. 1978, pp. 181–195. Springer, New York (2000)
Coppersmith, D., Halevi, S., Jutla, C.S.: Cryptanalysis of stream ciphers with linear masking. In: Yung, M. (ed.) Advances in Cryptology—CRYPTO 2002, Lecture Notes in Computer Science, vol. 2442 , pp. 515–532. Springer, New York (2002)
Courtois, N., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Biham, E. (ed.) Advances in Cryptology—EUROCRYPT 2003, Lecture Notes in Computer Science, vol. 2656, pp. 345–359. Springer, New York (2003)
Cover, T., Thomas, J.A.: Elements of Information Theory. Wiley Series in Telecommunication. Wiley, New York (1991)
ECRYPT. eSTREAM: ECRYPT Stream Cipher Project, IST-2002-507932. http://www.ecrypt.eu.org/stream/ (2008)
Ekdahl, P., Johansson, T.: SNOW—a new stream cipher. In: Proceedings of First Open NESSIE Workshop, Leuven, 13–14 November 2000
Englund, H., Hell, M., Johansson, T.: Correlation attacks using a new class of weak feedback polynomials. In: Roy, B., Meier, W. (eds.) Fast Software Encryption 2004, Lecture Notes in Computer Science, vol. 3017, pp. 127–142. Springer, New York (2004)
Englund, H., Hell, M., Johansson, T.: A note on distinguishing attacks. In: Helleseth, T., Vijay Kumar, P., Ytrehus, Ø. (eds.) Proceedings of the 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, pp. 87–90. IEEE, Piscataway (2007)
Englund, H., Hell, M., Johansson, T.: Two general attacks on Pomaranch-like keystream generators. In: Biryukov, A. (ed.) Fast Software Encryption 2007, Lecture Notes in Computer Science, vol. 4593, pp. 274–289. Springer, New York (2007)
Englund, H., Johansson, T., Turan, M.S.: A framework for chosen IV statistical analysis of stream ciphers. In: Srinathan, K., Pandu Rangan, C., Yung, M. (eds.) Progress in Cryptology—INDOCRYPT 2007, Lecture Notes in Computer Science, vol. 4859/2007, pp. 268–281. Springer, New York (2007)
Goldreich, O.: Foundations of Cryptography, vol. 1. Cambridge University Press, Cambridge (1999)
Golić, J.: Intrinsic statistical weakness of keystream generators. In: Advances in Cryptology—ASIACRYPT’94, pp. 91–103. Springer, New York (1994)
Golić, J.D.: Correlation via linear sequential circuit approximation of combiners with memory. In: Rueppel, R.A. (ed.) Advances in Cryptology—EUROCRYPT’92, Lecture Notes in Computer Science, vol. 658, pp. 113–123. Springer, New York (1993)
Golić, J.D.: Linear cryptanalysis of stream ciphers. In: Preneel, B. (ed.) Fast Software Encryption’94, Lecture Notes in Computer Science, volume 1008, pp. 154–169. Springer, New York (1995)
Golić, J.D.: Computation of low-weight parity check polynomials. Electron. Lett. 32(21), 1981–1982 (1996)
Gong, G., Gupta, K.C., Hell, M., Nawaz, Y.: Towards a general RC4-like keystream generator. In: Feng, D., Lin, D., Yung, M. (eds.) Conference on Information Security and Cryptology, Lecture Notes in Computer Science, vol. 3822, pp. 162–174. Springer, New York (2005)
Halevi, S., Coppersmith, D., Jutla, C.S.: Scream: a software-efficient stream cipher. In: Daemen, J., Rijmen, V. (eds.) Fast Software Encryption 2002, Lecture Notes in Computer Science, vol. 2365, pp. 195–209. Springer, New York (2002)
Hell, M., Johansson, T.: Cryptanalysis of Achterbahn-128/80. IET Inform. Sec. 1(2), 47–52 (2007)
Jansen, C.J.A., Helleseth, T., Kholosha, A.: Cascade jump controlled sequence generator (CJCSG). eSTREAM, ECRYPT Stream Cipher Project, Report 2005/022
Jansen, C.J.A., Helleseth, T., Kholosha, A.: Cascade jump controlled sequence generator and Pomaranch stream cipher (version 2). eSTREAM, ECRYPT Stream Cipher Project, Report 2006/006. http://www.ecrypt.eu.org/stream (2006)
Jansen, C.J.A., Helleseth, T., Kholosha, A.: Cascade jump controlled sequence generator and Pomaranch stream cipher (version 3). eSTREAM, ECRYPT Stream Cipher Project. http://www.ecrypt.eu.org/stream (2006)
Junod, P., Vaudenay, S.: Optimal key ranking procedures in a statistical cryptanalysis. In: Fast Software Encryption 2003, Lecture Notes in Computer Science, vol. 2887, pp. 235–246. Springer, New York (2003)
Lu, Y., Vaudenay, S.: Cryptanalysis of an E0-like combiner with memory. J. Cryptol. 21(3) 430–457 (2008)
Mantin, I., Shamir, A.: Practical attack on broadcast RC4. In: Matsui, M. (ed.) Fast Software Encryption 2001, Lecture Notes in Computer Science, vol. 2355, pp. 152–164. Springer, New York (2001)
Marsaglia, G.: DIEHARD battery of tests of randomness. http://www.stat.fsu.edu/pub/diehard/ (1995)
Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) Advances in Cryptology—EUROCRYPT’93, Lecture Notes in Computer Science, vol. 765, pp. 386–397. Springer, New York (1994)
Matsui, M.: The first experimental cryptanalysis of the data encryption standard. In: Desmedt, Y. (ed.) Advances in Cryptology—CRYPTO’94, Lecture Notes in Computer Science, vol. 839, pp. 1–11. Springer, New York (1994)
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC, Boca Raton (1997)
NESSIE. New European Schemes for Signatures, Integrity, and Encryption. http://www.cryptonessie.org (1999)
NIST. A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST Special Publication 800–22, (2001)
Paul, S., Preneel, B.: A new weekness in the RC4 keystream generator. In: Roy, B., Meier, W. (eds.) Fast Software Encryption 2004, Lecture Notes in Computer Science, vol. 3017, pp. 245–259. Springer, New York (2004)
Saarinen, M.-J.O.: Chosen-IV statistical attacks against eSTREAM ciphers. eSTREAM, ECRYPT Stream Cipher Project, Report 2006/013. http://www.ecrypt.eu.org/stream (2006)
Siegenthaler, T.: Correlation-immunity of nonlinear combining functions for cryptographic applications. IEEE Trans. Inf. Theory 30, 776–780 (1984)
Vaudenay, S.: An experiment on DES statistical cryptanalysis. In: 3rd ACM Conference on Computer and Communications Security, pp. 139–147. ACM, New York (1996)
Wagner, D.: Towards a unifying view of block cipher cryptanalysis. In: Fast Software Encryption 2004, Lecture Notes in Computer Science, vol. 3017, pp. 16–33. Springer, New York (2004)
Wagner, D.: A generalized birthday problem. In: Yung, M. (ed.) Advances in Cryptology—CRYPTO 2002, Lecture Notes in Computer Science, vol. 2442, pp. 288–303. Springer, New York (2002)
Watanabe, D., Furuya, S., Yoshida, H., Takaragi, K., Preneel, B.: A new keystream generator MUGI. In: Daemen, J., Rijmen, V. (eds.) Fast Software Encryption 2002, Lecture Notes in Computer Science, vol. 2365, pp. 179–194. Springer, New York (2002)
Wikipedia. A5/1 — wikipedia, the free encyclopedia. http://en.wikipedia.org/wiki/A5/1 (2008)
Wikipedia. RC4 — wikipedia, the free encyclopedia. http://en.wikipedia.org/wiki/RC4 (2008)
Wu, H.: Stream cipher HC-128. eSTREAM, ECRYPT Stream Cipher Project. http://www.ecrypt.eu.org/stream (2005)
Wu, H.: Stream cipher HC-256. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/011. http://www.ecrypt.eu.org/stream (2005)
Zoltak, B.: VMPC one-way function and stream cipher. In: Roy, B., Meier, W. (eds.) Fast Software Encryption 2004, Lecture Notes in Computer Science, vol. 3017, pp. 210–225. Springer, New York (2004)
Acknowledgements
The authors wish to thank the anonymous referees for their suggestions that helped improving the paper.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Hell, M., Johansson, T. & Brynielsson, L. An overview of distinguishing attacks on stream ciphers. Cryptogr. Commun. 1, 71–94 (2009). https://doi.org/10.1007/s12095-008-0006-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12095-008-0006-7