Sufficient condition for SNOW-2.0-like stream ciphers’ to be secure against some related key attacks
DOI:
https://doi.org/10.18372/2410-7840.18.11087Keywords:
stream cipher, Even-Mansour scheme, shifting equivalet keys, related key attacks, provable security, SNOW 2.0Abstract
A class of stream ciphers similar to the well-known SNOW 2.0 cipher is investigated. The formal description of the ciphers from this class is given and the relation between keysream-generation process of a SNOW 2.0-like cipher and the message encryption with Even-Mansour scheme is determined. The security of SNOW-2.0-like stream ciphers against attacks based on the existence of shifting equivalent keys is analyzed. These attacks are related key attacks and can be applied to many stream ciphers, particularly, to SNOW 2.0. The main result of this paper is a sufficient condition for SNOW 2.0-like ciphers to be secure againt mentioned attacks. This condition is convenient for prac-tical appliances and allows constructing the affine mappings (that proceed keys and initialization vectors inserting into the keystream generator) guarantee the security of corresponding ciphers against mentioned attacks. The two examples of such mappings that can be used for constructing of new SNOW 2.0-like ciphers are proposed.References
Berbain C. Understanding phase shifting equivalent keys and exhaustive search /C. Berbain, A. Gouget, H. Sibert // http://eprint.iacr.org/2008/169.
Dunkelman O. Minimalism in cryptography: the Even-Mansour scheme revisited / O. Dunkelman, N. Keller, A. Shamir // http://eprint.iacr.org/ 2011/541.
Ekdahl P. A new version of the stream cipher SNOW /P. Ekdahl, T. Johansson // Selected Areas in Cryp-tography – SAC 2002. – LNCS 2295. – Springer-Ver-lag. – P. 47 – 61.
Even Sh. A construction of a cipher from a single pseudorandom permutation / Sh. Even, Y. Mansour // J. of Cryptology. – 1997. – Vol. 10. – № 3. – P. 159 – 162.
Kircanski A. On the sliding property of SNOW 3G and SNOW 2.0 / A. Kircansk, A. Youssef // IET In-formation Security. – 2011. – Vol. 5. – № 4. – P. 199 – 206.
ISO/IEC 18033-4: 2011(E). Information technology – Security techniques – Encryption algorithm – Part 4: Stream ciphers, 2011. – 92 p.
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal adheres to the principles of Open Access and provides free, immediate, and permanent access to all published materials without financial, technical, or legal barriers for readers.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.