On the computational security of randomized stream ciphers proposed by Mihaljević and Imai

Authors

  • Антон Миколайович Олексійчук NTUU «KPI»
  • Сергій Володимирович Гришаков NTUU «KPI»

DOI:

https://doi.org/10.18372/2410-7840.16.7619

Keywords:

symmetric cryptography, randomized encryption, stream cipher, random coding, wiretap channel, LPN problem, correlation attack

Abstract

This paper yields a (computational) security analysis for a generic class of randomized stream ciphers based on joint employmentof encryption, error-correction coding, and dedicated random coding. We show that the security of these ciphers can be considerablyless than their designers claim. In contrast to the approach for security evaluation used before, our technique is significantly simplerand allows us to find out the code-theoretic sense of parameters that determine the security of these ciphers. We also proposeanother possible solution (based on nonlinear random coding) for design of randomized stream ciphers with enhanced security.

Author Biographies

Антон Миколайович Олексійчук, NTUU «KPI»

Doctor of Technical Science, Professor of Institute of Special Communication and Information Security of NTUU «KPI»

Сергій Володимирович Гришаков, NTUU «KPI»

applicant of Institute of Special Communication and Information Security of NTUU «KPI»

References

. Alekseychuk A. N., Gryshakov S. V., (2004) “Nonlinear random coding for information transmission systems with the wire-tap”, Legal, regulatory and metrological support information security system in Ukraine., Vol. 8, PP. 133-140.

. Alekseychuk A. N., (2007) “Analytical bounds of parameters that determine the provable security of randomized block ciphers against differential cryptanalysis”, Zakhist Inform, No 2., PP. 12-23.

. Alekseychuk A. N., (2007) “Sufficient conditions for randomized block cipher-systems to be secure against commutative diagram cryptanalysis”, Data Recording, Storage and Processing. ,Vol. 9., No 2., PP. 61-68.

. Logachev O.A., Sal’nikov A.A., Yashchenko V.V., (2004) “Boolean functions in coding theory and cryptology”, MCCME, Moscow.

. Canteaut A. (2005), “Fast correlation attacks against stream ciphers and related open problems”, The 2005 IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security – ITW 2005, EProc. (6 p.), Awaji Island, Japan.

. Gilbert H., Robshaw M.J.B., Seurin Y. (2008), “How to encrypt with the LPN problem”, ICALP 2008, Part II, Lecture Notes in Computer Science, Vol. 5126, PP. 679-690.

. MacWilliams F.J., Sloane N.J.A. (1977), “The theory of error-correcting codes”, North Holland, Amsterdam.

. Mihaljević M.J., Imai H. (2008), “A stream ciphering approach based on wiretap channel coding”, 8th Central European Conference of Cryptography, Graz, Austria, July 2-4, E-Proc. (3 p.).

. Mihaljević M.J., Imai H. (2009), “An approach for stream cipher design based on joint computing over random and secret data”, Computing, Vol. 85, No 1-2, June 2009, PP. 153-168.

. Mihaljević M.J., Oggier F., Imai H. (2010), “Homophonic coding design for communication systems employing the encoding-encryption paradigm”, in arXiv:1012.5895v1 [cs.CR], 29 Dec.

. Mihaljević M.J., Imai H. (2011), “Employment of homophonic coding for improvement of certain encryption approaches based on the LPN problem”, Symmetric Key Encryption Workshop – SKEW 2011, Copenhagen, Denmark, Feb. 16-17, E-Proc. (17 p.).

. Mihaljević M.J., Imai H. (2011), “An informationtheoretic and computational complexity security analysis of a randomized stream cipher model”, 4th Western European Workshop on Research in Cryptology – WeWoRC 2011, Weimar, Germany, July 20-22, Conf. Record PP. 21-25.

. Oggier F., Mihaljević M.J. (2010), “An informationtheoretic analysis of the security of communication systems employing the encoding-encryption paradigm”, in arXiv:1008.0968v1 [cs.CR], 5 Aug.

. Thangaraj A., Dihidar S., Calderbank A.R., McLaughlin S.W., Merolla J.-M. (2007), “Applications of LDPC codes to the wiretap channel”, IEEE Trans. Information Theory, Vol. 53, No 8, PP. 2933-2945.

. Wyner A.D. (1975), “The wire-tap channel”, Bell. Systems Technical Journal, Vol. 54, PP. 1355-1387.

Published

2015-03-09

Issue

Section

Articles