Skip to main content
Log in

Security analysis of a new stream cipher

  • Published:
Science in China Series F Aims and scope Submit manuscript

Abstract

In this paper, we analyze the security of a new stream cipher-COSvd(2, 128). This cipher was proposed by E. Filiol et al. at the ECRYPT SASC’2004 (The State of the Art of Stream Ciphers). It uses clock-controlled non-linear feedback registers together with an S-box controlled by a chaotic sequence and was claimed to prevent any existing attacks. However, our analysis shows that there are some serious security flaws in the design of the S-box, resulting in heavy biased byte distribution in the keystream. In some broadcast applications, this flaw will cause a ciphertext-only attack with high success rate. Besides, there are also many security flaws in other parts of the cipher. We point out these flaws one by one and develop a divide-and-conquer attack to recover the secret keys from O(226)-byte known plaintext with success rate 93.4597% and complexity O(2113), which is much lower than 2512, the complexity of exhaustive search.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Filiol E, Fontaine C, Josse S. The COSvd Ciphers. In: The State of the Art of Stream Ciphers, Workshop Record, Belgium, October 2004. 45–59

  2. Wu H, Bao F. Cryptanalysis of stream cipher COS (2,128) mode I. In: Australian Conference on Information Security and Privacy-ACISP’2002, LNCS Vol. 2384. Berlin: Springer-Verlag, 2002. 154–158

    Google Scholar 

  3. Babbage S. The COS stream ciphers are extremely weak. http://eprint.iacr.org/2001/078/

  4. Babbage S. Cryptanalysis of the COS (2,128) stream ciphers. http://eprint.iacr.org/2001/106/

  5. Filiol E, Fontaine C. A new ultrafast stream ciphers design: COS Ciphers. In: The 8th IMA Conference on Cryptography and Coding, LNCS Vol. 2260. Berlin: Springer-Verlag, 2001. 85–98

    Google Scholar 

  6. Orumiehchi M, Mirghadri M. A distinguish attack on COSvd cipher. http://eprint.iacr.org/2005/164/

  7. Henon M. A two-dimensional mapping with a strange attractor. Communic Math Phys, 1976, 50: 69–77

    Article  MATH  MathSciNet  Google Scholar 

  8. Goldberg D, Priest D. What every computer scientist should know about floating-point arithmetic. ACM Comp Surv, 1991, 23(1): 5–48

    Article  Google Scholar 

  9. Erdmann D, Murphy S. Henon stream cipher. Elect Lett, 1992, 28(9): 893–895

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhang Bin.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhang, B., Feng, D. Security analysis of a new stream cipher. SCI CHINA SER F 49, 286–301 (2006). https://doi.org/10.1007/s11432-006-0286-5

Download citation

  • Received:

  • Accepted:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11432-006-0286-5

Keywords

Navigation